Skip to content

Malicious Javascript injection via a POST request to /presale/join

Low
franckc published GHSA-v6fc-qwxx-m4h7 Apr 19, 2022

Package

No package listed

Affected versions

<c12d2f2

Patched versions

c12d2f2

Description

Impact

The vulnerability allows for malicious users to inject malicious Javascript via a POST request to /presale/join. User-controlled data is passed with no sanitization to SendGrid and injected into an email that is delivered to the founders@originprotocol.com email. If the email recipient is using an email program that is susceptible to XSS, then that email recipient will receive an email that may contain malicious XSS. Regardless if the email recipient’s mail program has vulnerabilities or not, the hacker can at the very least inject malicious HTML that modifies the body content of the email.

Patches

Patched in #617.

Workarounds

None.

References

This vulnerability was found using CodeQL (a query contribution by @mrthankyou and @jorgectf).

For more information

Contact security@originprotocol.com.

Severity

Low

CVE ID

CVE-2022-24864

Weaknesses

Credits