Stored-xss is working

Disclosed by
agnihackers123's avatar
agnihackers123
  • Engagement Indeed
  • Disclosed date almost 3 years ago
  • Points 1
  • Priority P4 Bugcrowd's VRT priority rating
  • Status Resolved This vulnerability has been accepted and fixed
Summary by agnihackers123

hello @Indeed I found stored-cross site on the activity which allows an attacker to steal admin account cookies.

Impact

Users can execute JavaScript code in the context of other users. This is critical when targeted users have high privileges. Attackers are then able to grant themselves the administrator privileges and even takeover the ownership of the New Relic account.

The hacker selected the Cross-site Scripting (XSS) - Stored weakness. This vulnerability type requires contextual information from the hacker. They provided the following answers:

STEP TO REPRODUCE:-

1)open the url:- [site]
2)Then type the company name is "hello"
3)Then change hello to javascript is entered
4)next button > click
5)Then show the popup message .
6)next page is on then refresh the page cookie is working popup message is show.
7)This is stored XSS.

This vuln is stored-xss . Attacker targeted users have high privileges. The hacker selected the Cross-site Scripting (XSS) - Stored weakness.

-->>Even attacker can easily get the cookie.

Thanks.

Activity
  1. Kyle_indeed’s avatar
    Kyle_indeed Customer published the disclosure report

    ()

  2. agnihackers123’s avatar
    agnihackers123 updated the disclosure summary

    ()

  3. agnihackers123’s avatar
    agnihackers123 sent a message

    ()

  4. Jarvis’s avatar
    Jarvis Customer changed the state to Resolved

    ()

  5. cliff_bugcrowd’s avatarbugcrowd logo
    cliff_bugcrowd sent a message

    ()

  6. agnihackers123’s avatar
    agnihackers123 sent a message

    ()

  7. agnihackers123’s avatar
    agnihackers123 sent a message

    ()

  8. agnihackers123’s avatar
    agnihackers123 sent a message

    ()

  9. Scourge_BC’s avatarbugcrowd logo
    Scourge_BC marked the submission a duplicate of a previously submitted report

    ()

  10. Scourge_BC’s avatarbugcrowd logo
    Scourge_BC changed the state to Unresolved

    ()

  11. Scourge_BC’s avatarbugcrowd logo
    Scourge_BC updated VRT to Cross-Site Scripting (XSS) > Stored > Self

    ()

  12. Scourge_BC’s avatarbugcrowd logo
    Scourge_BC rewarded agnihackers123 1 point

    ()

  13. Scourge_BC’s avatarbugcrowd logo
    Scourge_BC sent a message

    ()

  14. agnihackers123’s avatar
    agnihackers123 sent a message

    ()

  15. agnihackers123’s avatar
    agnihackers123 updated the disclosure summary

    ()

  16. agnihackers123’s avatar
    agnihackers123 requested disclosure

    ()

  17. a Crowdcontrol user’s avatarbugcrowd logo
    a Crowdcontrol user sent a message

    ()

  18. agnihackers123’s avatar
    agnihackers123 created the submission

    ()