XSS Exploit via RichText Parser
Reddit计划发帖功能存在漏洞,允许嵌入恶意JavaScript链接引发XSS攻击。该问题源于RichText解析器未正确过滤超链接。修复措施包括服务器端过滤和验证机制。 2025-8-22 07:43:34 Author: infosecwriteups.com(查看原文) 阅读量:12 收藏

How a Flaw in Reddit’s Scheduled Post Feature Enabled Malicious JavaScript Execution

Monika sharma

Press enter or click to view image in full size

A critical vulnerability in Reddit’s scheduled post feature, discovered by la_revoltage, exposed a flaw in the platform’s RichText parser. This vulnerability allowed attackers to embed malicious JavaScript links, potentially leading to cross-site scripting (XSS) attacks. This article explores the vulnerability, its root cause, reproduction steps, impact, and mitigation strategies.

The issue stemmed from Reddit’s RichText parser failing to filter hyperlinks on the server side within the scheduled post feature. By intercepting and modifying HTTP requests, attackers could replace legitimate links with malicious ones using the javascript: scheme, enabling XSS when administrators accessed the scheduled post editing page.

The vulnerability can be replicated through the following steps:

  1. Create a Scheduled Post: Log into Reddit and create a new scheduled post containing a legitimate hyperlink.

文章来源: https://infosecwriteups.com/xss-exploit-via-richtext-parser-352e1b39603b?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh