Cross-site-Scripting

Disclosed: 2017-05-05 20:50:29 By test_this To paragonie
Low
Vulnerability Details
step: 1: goto https://bridge.cspr.ng/my/account of your account 2. in "Custom Profile field option" check the box and enter xss payload in "display name" field payload: "p<script>alert('xss')</script>" 3. update the information 4. open the account in INTERNET EXPLORER 11 and xss will executed note: here server is not sanitize the user input properly, payload will not work in firefox,chrome browser due to "content-security-policy" But internet explorer does not Support "Content-Security-Policy" so xss will execut this is stored xss and the display name will visible to everywhere, so its possible to account takeover of ther user
Actions
View on HackerOne
Report Stats
  • Report ID: 226203
  • State: Closed
  • Substate: resolved
  • Upvotes: 4
Share this report