Skip to content

Stored XSS via form data submitted by the phishing victim #4

@dunderhay

Description

@dunderhay

A phishing victim can send an XSS payload that triggers in the SniperPhish admin panel.

As an example, this basic phishing landing page has a single form which accepts a username field from the phishing victim.

Screen Shot 2021-05-08 at 9 00 40 pm

The XSS is triggered when the admin views the Campaign Results in the WebMailCmpDashboard page.

Screen Shot 2021-05-08 at 9 03 53 pm

Screen Shot 2021-05-08 at 9 06 24 pm

Unlike the previous XSS I reported, this stored XSS can be triggered by the external phishing victim (via submitted form field data) and can be used to target admin users.

Metadata

Metadata

Assignees

No one assigned

    Labels

    sec-bug(low)A low security issue or AC is high

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions