Skip to content

Webasyst 2.9.9 - Stored XSS via the "Instant messenger" Field #378

@RealestName

Description

@RealestName

Summary

Webasyst 2.9.9 has a Stored XSS vulnerability, An Attacker inject malicious javascript code in the "Instant messenger" field for a stored XSS, This can lead to privilege escalation of user to admin, and more.

Steps to reproduce:

Go to "My profile"
Click "Edit".
On the Instant messenger field, enter payload: "><script>alert(document.domain)</script>
Click Save then XSS will trigger.

Impact

The attacker can steal data from whoever checks his profile.

POC:

image

image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions