Reflected Xss https://██████/

Disclosed: 2021-10-18 19:28:55 By 0xelkomy To deptofdefense
Medium
Vulnerability Details
Hello security all teams **Relevant Products/Components:** last version **Detailed Description:** Reflected XSS so have high impact. **Steps To Reproduce:** 1-go in subdomain 2-and check url if tableau uses 3-Uses you can add this redirect dir in url with Authentication redirect:- /en/embeddedAuthRedirect.html?auth=javascript:alert(%22xElkomy%22) **Such as** https://████████/en/embeddedAuthRedirect.html?auth=javascript:alert(%22xElkomy%22) **Browsers Verified In:** all browsers supporting javascript **Supporting Material/References:** ███ **Access Vector Required for Exploitation:** no required any access but need only web access :) **Vulnerability Exists in Default Configuration?:** yes **Exploitation Requires Authentication?:** no need anything #xElkomy ## Impact The need for an external delivery mechanism for the attack means that the impact of reflected XSS is generally less severe than stored XSS, where a self-contained attack can be delivered within the vulnerable application itself.
Actions
View on HackerOne
Report Stats
  • Report ID: 759418
  • State: Closed
  • Substate: resolved
  • Upvotes: 11
Share this report