Stored xss in address field in billing activity at https://shop.aaf.com/Order/step1/index.cfm

Disclosed: 2019-05-25 09:08:06 By gujjuboy10x00 To aaf
High
Vulnerability Details
Dear Team, **Summary:** [add summary of the vulnerability] After looking into https://shop.aaf.com/Order/step1/index.cfm i get to know that there is address field is vulnerable to stored xss which can lead to steal any user's cookie and can lead to complete account takeover **Description:** [add more details about this vulnerability] ## Steps To Reproduce: 1. go to https://shop.aaf.com and click on any products , tshirt 2. add that in cart and click on proceed 3. enter xss payload (a"><svg/onload=prompt(1)> ) in every address field and click on OK proceed 4. xss will popup ## Supporting Material/References: XSS OWASP Thanks, Vishal ## Impact Stored xss in address field in billing activity at https://shop.aaf.com/Order/step1/index.cfm
Actions
View on HackerOne
Report Stats
  • Report ID: 411690
  • State: Closed
  • Substate: resolved
  • Upvotes: 238
Share this report