Reflected XSS in ████████████
Medium
Vulnerability Details
**Description:**
XSS vulnerability found on one of `███████` subdomains. [ DoD scope]
After analyzing `https://████████████/` (national levee database) I found `auth/logout.jsx` page that have `home` parameter in `GET` request. `home` parameter vulnerable to XSS vulnerability.
Payload:
`https://█████████████████/auth/logout.jsx?home=javascript:(alert(%27XSS%20Success!%27))()`
████████
## References
https://owasp.org/www-community/attacks/xss/
## Impact
By exploiting this vulnerability an attacker can trick the users to execute XSS and steal user's cookies.
Launch advanced phishing attacks.
Execute browser-based attacks etc.
## System Host(s)
███████
## Affected Product(s) and Version(s)
## CVE Numbers
## Steps to Reproduce
* Visit the following URL
`https://████████████████/auth/logout.jsx?home=javascript:(alert(%27XSS%20Success!%27))()`
* click on `Click here to return to your application.` and you will receive `XSS Success!` alert box.
## Suggested Mitigation/Remediation Actions
Actions
View on HackerOneReport Stats
- Report ID: 1882592
- State: Closed
- Substate: resolved
- Upvotes: 21