PREMIUM CYBERSECURITY RESOURCES β€’ 90% OFF TODAY β€’ GET INSTANT ACCESS

Just 5 Minutes to My 2nd Stored XSS on Edmodo.com

1 cool T-shirt + 1 shaker + 10 badges + 3 i love edmodo magnets

How I Found the Bug

My overall experience with Edmodo has been excellent. They provide:

  • ⚑ Quick responses to security reports
  • 🎁 Cool swag (just look at that haul!)
  • πŸ” Lots of input fields to test (perfect for hunters)

The Accidental Discovery

This time, it wasn’t planned. I was bouncing between different bug bounty programs when I decided to check Edmodo again.

Suddenly, I noticed something different - I was redirected to new.edmodo.com. A new subdomain means new attack surface! 🎯

The Testing Process

  1. Posted my XSS polyglot on new school creation
  2. Tested the poll feature with various payloads
  3. Clicked my profile picture - redirected to www.edmodo.com/*
  4. Noticed notifications on this domain
  5. Clicked a notification and… BOOM! πŸ’₯

The Vulnerability

The notification system wasn’t sanitizing user input. When I clicked on a notification containing my payload, it executed in the context of www.edmodo.com.

πŸ’‘ Key Takeaway: Always test notification systems, profile views, and cross-subdomain interactions!

Key Takeaways for Bug Hunters

  1. Test new subdomains immediately - new.edmodo.com led to this find
  2. Don’t ignore notification features - they often handle user input poorly
  3. Cross-subdomain testing - my payload worked across different edmodo domains
  4. Re-use successful payloads - that same polyglot worked twice!

Video Proof of Concept

Twitter Status

Twitter Status

Timeline

  • πŸ› XSS Reported to Edmodo on 31st January, 2019
  • βœ… Triaged and rewarded on 4th February, 2019
  • 🎁 Swag received on 13th February, 2019