XSS Exploit via RichText Parser
Reddit的定时发布功能存在严重漏洞,其RichText解析器未能有效过滤超链接,在服务器端未进行充分验证。攻击者可利用javascript: scheme替换合法链接,导致XSS攻击。该漏洞已被修复。 2025-8-22 07:43:34 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

How a Flaw in Reddit’s Scheduled Post Feature Enabled Malicious JavaScript Execution

Monika sharma

Press enter or click to view image in full size

A critical vulnerability in Reddit’s scheduled post feature, discovered by la_revoltage, exposed a flaw in the platform’s RichText parser. This vulnerability allowed attackers to embed malicious JavaScript links, potentially leading to cross-site scripting (XSS) attacks. This article explores the vulnerability, its root cause, reproduction steps, impact, and mitigation strategies.

The issue stemmed from Reddit’s RichText parser failing to filter hyperlinks on the server side within the scheduled post feature. By intercepting and modifying HTTP requests, attackers could replace legitimate links with malicious ones using the javascript: scheme, enabling XSS when administrators accessed the scheduled post editing page.

The vulnerability can be replicated through the following steps:

  1. Create a Scheduled Post: Log into Reddit and create a new scheduled post containing a legitimate hyperlink.

文章来源: https://infosecwriteups.com/xss-exploit-via-richtext-parser-352e1b39603b?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh