How We Discovered a Stored HTML Injection in a Chatbot System ️
测试发现pyng.co.in的AI聊天机器人存在存储型HTML注入漏洞,输入的HTML标签未被过滤直接渲染;尽管尝试多种payload,但JavaScript执行受限。 2025-7-27 04:35:48 Author: infosecwriteups.com(查看原文) 阅读量:16 收藏

While exploring the AI chatbot feature of pyng.co.in, we noticed an input field where users could send messages. At first, it seemed harmless — but our curiosity nudged us to test how it handled raw HTML.

We entered the following simple HTML tag as our message:

<h1>Hello from Het & Kaif</h1>

To our surprise, when the chat history was loaded on page refresh or revisit, the message was rendered exactly as HTML — not escaped, not sanitized.
This confirmed a stored HTML injection — the HTML was being stored server-side and rendered client-side without any filtering.

We also tried several other payloads to confirm the injection:

<b style="color:red">XSS</b>
<i onclick="alert('XSS')">Click me</i>
<div style="background:red;padding:10px">Injected DIV</div>
<b style="color:red">XSS</b>

However, since JavaScript execution was fully disabled, despite attempting multiple payloads and bypass techniques, we were unable to achieve any successful execution.


文章来源: https://infosecwriteups.com/how-we-discovered-a-stored-html-injection-in-a-chatbot-system-%EF%B8%8F-6cbefe8b0718?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh