Reflected Cross-Site Scripting/HTML Injection

Disclosed: 2021-12-17 16:54:03 By jak0_ To informatica
Low
Vulnerability Details
The default ASP page at https://███/redirect/default.asp is vulnerable to reflected Cross-Site Scripting in the "url" parameter. To reproduce the issue just visit the following URL and an alert should pop up: - https://██████████/redirect/?url=%3Cscript%3Ealert(document.domain)%3C/script%3E It seems that the redirects subdomain is used to forward users to internal resources, so this vulnerability could be used to execute JavaScript in the context of an internal user and use the browser as a proxy or steal credentials for internal resources. In a practical attack scenario, the XSS payload could change the location of the following VPN endpoints to a phishing site and capture VPN credentials: - https://██████████ - https://██████ - https://███ ## Impact This vulnerability could be used practically in phishing attacks to proxy traffic through internal users' browsers and ultimately lead to internal credential leaks.
Actions
View on HackerOne
Report Stats
  • Report ID: 1379158
  • State: Closed
  • Substate: resolved
  • Upvotes: 2
Share this report