stored xss in getgrav/grav
Reported on
Mar 26th 2022
Description
Stored XSS is a vulnerability in which the attacker can execute arbitrary javascript code in the victim's browser. The XSS payload is stored in a webpage and it gets executed whenever someone visits that webpage
Proof of Concept
1. A low-priv user create a page with the following payload:
a'"></title></script><img src=x onerror=confirm(document.domain)></p>
2. Victim visit the page and see xss is executed
XSS alert will show the domain name.
Impact
Attacker can execute arbitrary javascript code in the victim's browser
I consider admin privileges to be high -- you do need an admin account to perform this attack.
I was able to reproduce the issue.