Multiple Stored XSS on Sanbox.veris.in through Veris Frontdesk Android App

Disclosed: 2016-06-12 16:04:43 By itly To veris
Unknown
Vulnerability Details
Hello Team, I have found multiple cross site scripting vulnerabilities on sanbox.veris.in due to the malicious input injected through veris frontdesk android app. Vulnerable App : Veris Frontdesk Android App Vulnerable Input Fields: 1) Who do you wish to meet? 2) Additional Information Payload used: <img src=x onerror=alert(3)> and <img src=x onerror=alert(4)> Reflects where: https://sandbox.veris.in/portal/visitor-log/ Steps to Reproduce: 1. Open Veris Front Desk App. 2. Go to Check In. 3. Enter the required details like first name, last name and phone number. 4. Proceed to Next. 5. Inject the above mentioned payload in vulnerable input fields. 6. Submit it and Check In. 7. Login to your account on sandbox.veris.in 8. Go to https://sandbox.veris.in/portal/visitor-log/ 9. Tadaa! XSS Triggers. Proof of Concept: Please find the attached screenshots. Do evaluate it and inform me accordingly. Best Regards, Hely H. Shah
Actions
View on HackerOne
Report Stats
  • Report ID: 121275
  • State: Closed
  • Substate: resolved
  • Upvotes: 1
Share this report