XSS Reflected

Disclosed: 2023-09-08 17:19:43 By ferreiraklet_ To deptofdefense
Medium
Vulnerability Details
## Summary: Hi team, It was found a xss reflected in your web asset. Reflected Cross-site Scripting (XSS) occur when an attacker injects browser executable code within a single HTTP response.When a web application is vulnerable to this type of attack, it will pass unvalidated input sent through requests back to the client. ## Steps To Reproduce: 1. Access the url `https://███.aspx/%22%20onmouseover=%22prompt(1)%22%20x=%22` 2. See the popup in the screen ## Supporting Material/References: [list any additional material (e.g. screenshots, logs, etc.)] * [attachment / reference] ███ ## Impact ## Impact * An attacker that can control the code executed in a victim browser can usually fully compromise this victim. This includes : * Perform any action within the application that the user can perform. * Modify any information that the user is able to modify. * Steal user cookies * Redirect to phishing site * Arbitrary requests - An attacker can use XSS to send requests that appear to be from the victim to the web server. * Malware download - XSS can prompt the user to download malware. Since the prompt looks like a legitimate request from the site, the user may be more likely to trust the request and actually install the malware. * Run Arbitrary javascript code into victim's browser ## System Host(s) ██████ ## Affected Product(s) and Version(s) ## CVE Numbers ## Steps to Reproduce 1. Access the url `https://███████.aspx/%22%20onmouseover=%22prompt(1)%22%20x=%22` 2. See the popup in the screen ## Suggested Mitigation/Remediation Actions
Actions
View on HackerOne
Report Stats
  • Report ID: 1892317
  • State: Closed
  • Substate: resolved
  • Upvotes: 13
Share this report