Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] XSS Vulnerability in DeepSeek AI #526

Open
0xSaikat opened this issue Feb 1, 2025 · 1 comment
Open

[BUG] XSS Vulnerability in DeepSeek AI #526

0xSaikat opened this issue Feb 1, 2025 · 1 comment

Comments

@0xSaikat
Copy link

0xSaikat commented Feb 1, 2025

A Cross-Site Scripting (XSS) vulnerability has been identified in DeepSeek AI, which allows an attacker to inject and execute arbitrary JavaScript code. This vulnerability could be exploited to compromise user sessions, steal sensitive information, or conduct phishing attacks.

Steps to Reproduce:

  1. Inject the following payload into an input field that reflects output without proper sanitization:
<iframe srcdoc="

Ethically hacked by 0xSaikat (হা.. হা.. হা.. এটাই বাস্তব, I love you)

" onload="alert('XSS by 0xSaikat - (হা.. হা.. হা.. এটাই বাস্তব, I love you)')"></iframe>
  1. When the affected page loads, the JavaScript executes, displaying an alert box.

Image

Expected Behavior:

  • The application should sanitize user input and prevent script execution.
  • HTML tags and JavaScript should not be rendered or executed.
  • The input should be displayed as plain text if reflected.

Actual Behavior:

  • The input is improperly sanitized, allowing execution of the injected JavaScript.
  • The alert box appears, confirming the execution of arbitrary JavaScript in the victim's browser.
  • This can lead to session hijacking, phishing attacks, or malicious redirections.

PoC: https://www.linkedin.com/posts/0xsaikat_cybersecurity-bugbounty-xss-activity-7291490988076732416-bnVJ?utm_source=share&utm_medium=member_desktop

Impact:

  • Malicious actors could use this vulnerability to execute arbitrary JavaScript in a victim's browser.
  • Possible session hijacking, credential theft, and phishing attacks.

Recommendation:

  • Implement strict input validation and output encoding (e.g., using htmlspecialchars() or equivalent).
  • Use a Content Security Policy (CSP) to restrict inline script execution.

Thank you and have a great day!

@0xSaikat 0xSaikat changed the title XSS Vulnerability in DeepSeek AI [Bug] XSS Vulnerability in DeepSeek AI Feb 1, 2025
@0xSaikat 0xSaikat changed the title [Bug] XSS Vulnerability in DeepSeek AI [BUG] XSS Vulnerability in DeepSeek AI Feb 1, 2025
@bitst0rm
Copy link

bitst0rm commented Feb 1, 2025

Similar expert #514

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants