Loading HuntDB...

Reflected XSS at https://www.glassdoor.co.in/FAQ/Microsoft-Question-FAQ200086-E1651.htm?countryRedirect=true via PATH

Medium
G
Glassdoor
Submitted None
Reported by n1xk_10

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
**Summary:** The endpoint https://www.glassdoor.co.in/FAQ/Microsoft-Question-FAQ200086-E1651.htm?countryRedirect=true is vulnerable to reflected XSS. Injecting any input in path will be reflected back without any sanitisation. Affected URL or select Asset from In-Scope: https://www.glassdoor.co.in/FAQ/Microsoft-Question-FAQ200086-E1651.htm?countryRedirect=true Injection point: Path Vulnerability Type: Reflected XSS Browsers tested: Safari, Chrome, Firefox Payload: %22%3e%3cimg%20onerro%3d%3e%3cimg%20src%3dx%20onerror%3dalert%601%60%3e ## Steps To Reproduce: 1. Navigate to https://www.glassdoor.co.in/FAQ/Microsoft-Question-FAQ200086-E1651.htm?countryRedirect=true 2. input the payload inside path. 3.Open this url: https://www.glassdoor.co.in/FAQ/Mic%22%3e%3cimg%20onerro%3d%3e%3cimg%20src%3dx%20onerror%3dalert%601%60%3e rosoft-Question-FAQ200086-E1651.htm?countryRedirect=true An alert will be popped up. ## Impact Using XSS an attacker can steals the victim cookie and can also redirect him to a malicious site controlled by the attacker.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected