Potential XSS Vulnerability in Acronis Login Callback URL

Disclosed: 2024-11-06 09:21:27 By kindone To acronis
High
Vulnerability Details
## Summary The login callback URL, https://learn.acronis.com/portal/, is vulnerable to Cross-Site Scripting (XSS) attacks. When a user logs in and is redirected to this URL, the redirectUrl parameter is not properly sanitized, allowing an attacker to inject arbitrary JavaScript code. This code could be used to steal the user's session cookie, perform phishing attacks, or deface the website. ## Steps To Reproduce I was able to exploit this vulnerability by crafting a URL that included malicious JavaScript code in the redirectUrl parameter. When a user clicks on this URL and logs in, the injected code is executed in the user's browser. For example, the following URL would display an alert containing the website domain: https://learn.acronis.com/portal/login-callback?redirectUrl=javascript:alert(document.domain) An attacker could replace the alert with malicious code that steals the user's session cookie or redirects the user to a phishing website. {F3449354} ## Impact This vulnerability could allow an attacker to: - Steal user session cookies - Perform phishing attacks - Deface the website - Take control of user accounts
Actions
View on HackerOne
Report Stats
  • Report ID: 2611305
  • State: Closed
  • Substate: resolved
  • Upvotes: 25
Share this report