Reflected XSS in ████████████

Disclosed: 2023-04-14 17:26:48 By 0xd3adc0de To deptofdefense
Medium
Vulnerability Details
**Description:** XSS vulnerability found on one of `███████` subdomains. [ DoD scope] After analyzing `https://████████████/` (national levee database) I found `auth/logout.jsx` page that have `home` parameter in `GET` request. `home` parameter vulnerable to XSS vulnerability. Payload: `https://█████████████████/auth/logout.jsx?home=javascript:(alert(%27XSS%20Success!%27))()` ████████ ## References https://owasp.org/www-community/attacks/xss/ ## Impact By exploiting this vulnerability an attacker can trick the users to execute XSS and steal user's cookies. Launch advanced phishing attacks. Execute browser-based attacks etc. ## System Host(s) ███████ ## Affected Product(s) and Version(s) ## CVE Numbers ## Steps to Reproduce * Visit the following URL `https://████████████████/auth/logout.jsx?home=javascript:(alert(%27XSS%20Success!%27))()` * click on `Click here to return to your application.` and you will receive `XSS Success!` alert box. ## Suggested Mitigation/Remediation Actions
Actions
View on HackerOne
Report Stats
  • Report ID: 1882592
  • State: Closed
  • Substate: resolved
  • Upvotes: 21
Share this report