Cross Site Scripting -> Reflected XSS

Disclosed: 2018-07-11 06:04:28 By kjashwanth13 To olx
Unknown
Vulnerability Details
Steps:- 1. Go to http://www.olx.ba/pretraga?trazilica="PAYLOAD" 2.Payload :- "onmousemove=alert("XSS_BY_JASHWANTH") " 3. You will get Pop up 4. If the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser. Impact Attacker can make use of this to conduct attacks like phishing, temporary defacements, user session hijacking, possible introduction of worms etc. Poc : Attached Screenshot Recommendation • Revisit the entire application and validate the user input at server side. • Apply white listing technique to filter out unexpected input. • Sanitize the data collected from input fields before further processing. • Filter out special and meta-characters from user input. • HTML encode the output that is echoed back to the user.
Actions
View on HackerOne
Report Stats
  • Report ID: 150568
  • State: Closed
  • Substate: resolved
  • Upvotes: 17
Share this report