HTML Injection on ████

Disclosed: 2019-12-02 18:34:30 By akaki To deptofdefense
Medium
Vulnerability Details
**Summary:** HTML Injection vulnerabilities on █████████ Air Base Site. **Description:** Search value are output without being escaped. HTML Injection via ```Category``` parameter http://█████████/News/Commentaries?Search=security&Category=%22%3E%3Cimage/src=%22//███████/sealift/2011/July/images/Gumbyleaning2.jpg Response HTML ``` <div class="dig_pager"> <a class="dig_pager_button dig_pager_current" href="http://█████████/News/Commentaries/Search/security?Category="><image/src="//████████/sealift/2011/July/images/Gumbyleaning2.jpg"><span>1</span></a> ``` ## Impact - By setting inappropriate contents, the impression of the organization deteriorates. For example, short URLs that set porn images and graphic images are shared by SNS. - GET request can be generated from the victim's browser. For example, there are cases where it is possible to log out a Web service used by the victim. >This discussion is helpful. >http://security.stackexchange.com/a/135548 ## Suggested Remediation Actions Escape HTML before inserting untrusted data into element content. Because WAF is running on this site, I could not do XSS. However, since WAF may be bypassed, I recommend HTML escaping.
Actions
View on HackerOne
Report Stats
  • Report ID: 198218
  • State: Closed
  • Substate: resolved
  • Upvotes: 5
Share this report