XSS found for https://█████████

Disclosed: 2024-08-29 17:46:25 By thpless To deptofdefense
Medium
Vulnerability Details
* Location: POST request to the endpoint `/web/guest/search` * Parameter Affected: `query=` * Proof of Concept: ``` <html> <body> <script> window.onload = function(){document.forms['XSS'].submit();} </script> <form id='XSS' action='https://█████████/web/guest/search' method='post'> <input type='text' name='query' value="'};alert('XSS');var x={y:'"> </form> </body> </html> ``` ## Impact An attacker can craft a malicious payload and trick a user into sending a POST request to the vulnerable endpoint. The unvalidated and unsanitized data is then reflected in the server’s response, allowing the attacker to execute arbitrary JavaScript code in the victim’s browser. This could lead to session hijacking, redirection to malicious sites, or unauthorized actions being performed in the context of the authenticated user. ## System Host(s) ██████████ ## Affected Product(s) and Version(s) ██████████ WebPortal ## CVE Numbers ## Steps to Reproduce You can download the added exploit.html and open it in a browser ████ ## Suggested Mitigation/Remediation Actions To fix this issue, ensure that all user-supplied data is properly sanitized and encoded before being reflected in the server's response. Implementing Content Security Policy (CSP) headers can also mitigate the risk of XSS attacks by restricting the sources from which scripts can be loaded.
Actions
View on HackerOne
Report Stats
  • Report ID: 2670521
  • State: Closed
  • Substate: resolved
  • Upvotes: 45
Share this report