Reflected XSS at ████████

Disclosed: 2023-02-24 18:39:53 By ohzo To deptofdefense
Medium
Vulnerability Details
The domain █████████ have dochelper where the user id is submitted. We can submit the crafted XSS payload to pop the alert message by accesing the cookie. POC URL: ``` https://████/dochelper?userId=</b><script>alert(document.cookie)</script><b><!-- ``` █████ ## References CVE-2016-5682 https://portswigger.net/web-security/cross-site-scripting https://www.bugbountyhunter.com/vulnerability/?type=xss ## Impact * As an attacker, I can Steal the cookie of the User, by sending a crafted mail to them. * Victim's Account can be compramised * Impersonate or masquerade as the victim user. * Carry out any action that the user is able to perform. * Read any data that the user is able to access. * Capture the user's login credentials. * Perform virtual defacement of the web site. * Inject trojan functionality into the web site. ## System Host(s) █████████ ## Affected Product(s) and Version(s) ## CVE Numbers CVE-2016-5682 ## Steps to Reproduce 1. Visit https://████████/dochelper?userId= 2. Put a crafetd XSS payload to the userId parameter. (</b><script>alert(document.cookie)</script><b><!--) 3. Open the link in the browser ## Suggested Mitigation/Remediation Actions 1. Filter input on arrival 2. Encode data on output.
Actions
View on HackerOne
Report Stats
  • Report ID: 1834042
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report