Reflected XSS on the data.gov (WAF bypass+ Chrome XSS Auditor bypass+ works in all browsers)

Disclosed: 2017-09-15 13:39:04 By sp1d3rs To gsa_bbp
Medium
Vulnerability Details
##Description Hello. I discovered Cross-Site scripting issue on the https://www.data.gov/local/ endpoint. The issue can be site-wide, and exploitable in any place, where pagination exist. ##The Impact and Severity I assigned the High severity, because unlike the last #263226 report (that XSS was exploitable in the Firefox only), this XSS works in all browsers (Chrome/IE/Firefox). But, considering that this case requires user interaction (hovering the mouse to the Page 2), the severity can be lowered to the Medium, if you consider so. ##POC (Reflected XSS) Use this link in the Mozilla Firefox, Chrome or IE https://www.data.gov/local/?&q&zzz%27onmou%3Cseover=1&ale%3Crt(%27xsp%27%3C)%3C;1;%20// and hover the mouse to the page 2. {F217930} ##Suggested fix Sanitize the URLs in the `<div class="pagination">` block.
Actions
View on HackerOne
Report Stats
  • Report ID: 265528
  • State: Closed
  • Substate: resolved
  • Upvotes: 28
Share this report