Stored XSS at ██████userprofile.aspx
High
Vulnerability Details
**Summary:**
Stored XSS vulnerability exists at ██████████userprofile.aspx under "say something about yourself...". XSS can be used for a variety of attacks.
## Impact
XSS can be used to steal cookies, password or to run arbitrary code in the victim's browser.
## Step-by-step Reproduction Instructions
1. Create an account at ███████
2. Go to your profile at ████userprofile.aspx
3. Go to "Say something about yourself..." and enter the XSS payload xxx<svg/onload=alert(document.cookie);>xxx
4. Observe that XSS triggers and reload the page to observe that it is stored XSS.
## Product, Version, and Configuration (If applicable)
███userprofile.aspx#
## Suggested Mitigation/Remediation Actions
Use secure coding techniques such as sanitizing input into form fields so attackers cannot inject scripts to perform XSS attacks. XSS vulnerabilities come from a lack of data escaping.
##References
https://hackerone.com/reports/858255
https://dzone.com/articles/reflected-xss-explained-how-to-prevent-reflected-x
https://www.imperva.com/learn/application-security/reflected-xss-attacks/
https://www.hacksplaining.com/prevention/xss-reflected
## Impact
XSS can be used to steal cookies, password or to run arbitrary code in the victim's browser.
Actions
View on HackerOneReport Stats
- Report ID: 901377
- State: Closed
- Substate: resolved
- Upvotes: 6