Potential XSS in redirect_url Parameter

Disclosed: 2024-11-06 09:19:15 By kindone To acronis
Medium
Vulnerability Details
## Summary An XSS vulnerability has been identified on https://learn.acronis.com/ in the redirect_url parameter. By manipulating the redirectUrl parameter, it is possible to inject arbitrary JavaScript code ## Steps To Reproduce 1) Log in to your https://learn.acronis.com/ account 2) Navigate to the following URL: https://learn.acronis.com/portal/licensing-check?redirect_url=javascript:alert(document.domain) 3) Observe that an alert box displaying the current domain (document.domain) appears, indicating that the JavaScript code was executed. {F3517115} ## Suggested Fix: Validate and sanitize the redirectUrl parameter to ensure that it does not contain any malicious content. This can be done by: - Restricting the parameter to only allow URLs that belong to the same origin. - Encoding or escaping any user input before including it in the URL. ## Impact An attacker can perform the following actions using this vulnerability: - Steal sensitive information, such as cookies, session tokens, or other sensitive data. - Perform actions on behalf of the victim by exploiting their authenticated session.
Actions
View on HackerOne
Report Stats
  • Report ID: 2653342
  • State: Closed
  • Substate: resolved
  • Upvotes: 23
Share this report