Reflected XSS in OLX.in

Disclosed: 2016-11-02 20:22:13 By yashmaurya To olx
High
Vulnerability Details
Hello @olx I found the Reflected XSS in olx.in Mobile Site through which malicious javascript code can be executed **Affected Parameter:** search[city_id]=xxxxxx _POC:_ ====== Opening This URL will Popup a Alert Box Having "XSS" as Msg (Screenshot Added in Attachments) [https://www.olx.in/i2/mumbai/mobile-phones/?search[city_id]=58997%27;%20alert%28%22XSS%22%29;%20var%20d=%27](https://www.olx.in/i2/mumbai/mobile-phones/?search[city_id]=58997%27;%20alert%28%22XSS%22%29;%20var%20d=%27) The Changed Javascript Code Being Echoed **From** ``` var subregionID = '58997'; ``` **To** ``` var subregionID = '58997'; alert("XSS"); var d=''; ``` _Impact:_ ====== This type of vulnerability mostly used for cookie steeling which can lead to full account compromised. _Suggested Fix:_ ====== All Parameters Should Be Properly Escaped Before Being Echoed
Actions
View on HackerOne
Report Stats
  • Report ID: 175801
  • State: Closed
  • Substate: resolved
  • Upvotes: 4
Share this report