Yeah! I got P2 in 1 minute - Stored XSS via Markdown Editor

Jul 2, 2019 · 2 min read
Image for post
Image for post

Hello! I want to tell about my “Bug Bounty” writeup “Stored XSS (Cross-Site Scripting)” and my lucky story, this is my fastest finding which has HIGH severity (P2).

I discovered P2 (Stored XSS) vulnerability when I reporting P4 (Denial of Service).

The idiom, said:
Kill two birds with one stone.

Okay, here we go!

Initially i create a Denial of Service (P4) report:

## Steps to Reproduce:

1. Go to [Here](https://[REDACTED]/[REDACTED])...

While thinking of words to make reports, i remembered something and tried to create XSS payload in markdown editor (but I didn’t expect to be XSS).

At the end of my report, I added (XSS Payload):



Then, i submit my P4 report.

What the …

Image for post
Image for post
Boom! Gotcha!

Really? It work! and I still don’t believe it.
So many reports entered in that platform, only I tried this?

Image for post
Image for post
Debugger (F12)
Image for post
Image for post
View Source (CTRL + U)

Oh no, I’m just lucky kid

After that, I started to create my P2 submission.

BONUS! Markdown XSS payloads:


![“ onmouseover=”alert(‘1337’);](https://img.uri/random.png)




Thank you for reading.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch

Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore

Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store