XSS in https://promo.acronis.com/

Disclosed: 2024-08-26 15:34:06 By yash_ To acronis
Low
Vulnerability Details
Hello, I found DOM XSS in https://promo.acronis.com/ Open this URL https://promo.acronis.com/GL-Trial-MassTransit.html and view source. Search for `document.write` and there will be 4 statements inside try/catch block. {F988381} The last statement loads script from using `document.referrer`. So we can host a page that loads https://promo.acronis.com/GL-Trial-MassTransit.html in iframe. So it will load the script `/marketo/common.js` from our domain. ## Steps To Reproduce 1. To create server I am using Node.js you can use static files also.. If you are using static files server make sure to create `/marketo/common.js` file. 1. Create a director and copy this file F988371 in it. 1. Run `npm init -y` 1. and then `npm i express` to install exprss. 1. Now run `node index.js` this will start server on 'localhost:5000' 1. Open http://localhost:5000 and you will see alert. {F988380} ## Impact Anyone who opens this page, attacker can execute JavaScript code on their device or redirect victims to phishing websites.
Actions
View on HackerOne
Report Stats
  • Report ID: 982442
  • State: Closed
  • Substate: resolved
  • Upvotes: 19
Share this report