DOM XSS at www.forescout.com in Microsoft Edge and IE Browser
Medium
Vulnerability Details
## Summary:
I've found an DOM Based XSS on homepage
## Steps To Reproduce:
1.Go to this url and you'll see alert pop
`https://www.forescout.com/#<img src=x onerror=alert('XSS')>`
But this will work just on ME/IE browsers because chrome and firefox have default encode system hash url
And vulnerable code is on your directly source code within jquery code. As you can see there is no encode in ==window.location.hash== code so when we open the page with #<img src=x onerror=alert(1)> it executes code.
`jQuery(window).load(function() {
jQuery('a.fancybox-inline[href="' + window.location.hash + '"]:first').each(function() {
jQuery(this).delay(700).trigger('click');
});
});`
## Supporting Material/References:
I have uploaded a picture to show you POC
Regards
Enesdex
## Impact
--Hacker can execute malicious codes in victim's browser
--Hacker can redirect user to malicious website
--Hacker can steal victim's cookies etc.
Actions
View on HackerOneReport Stats
- Report ID: 704266
- State: Closed
- Substate: resolved
- Upvotes: 95