Reflected XSS at https://www.glassdoor.co.in/FAQ/Microsoft-Question-FAQ200086-E1651.htm?countryRedirect=true via PATH
Medium
G
Glassdoor
Submitted None
Actions:
Reported by
n1xk_10
Vulnerability Details
Technical details and impact analysis
**Summary:**
The endpoint https://www.glassdoor.co.in/FAQ/Microsoft-Question-FAQ200086-E1651.htm?countryRedirect=true is vulnerable to reflected XSS.
Injecting any input in path will be reflected back without any sanitisation.
Affected URL or select Asset from In-Scope: https://www.glassdoor.co.in/FAQ/Microsoft-Question-FAQ200086-E1651.htm?countryRedirect=true
Injection point: Path
Vulnerability Type: Reflected XSS
Browsers tested: Safari, Chrome, Firefox
Payload: %22%3e%3cimg%20onerro%3d%3e%3cimg%20src%3dx%20onerror%3dalert%601%60%3e
## Steps To Reproduce:
1. Navigate to https://www.glassdoor.co.in/FAQ/Microsoft-Question-FAQ200086-E1651.htm?countryRedirect=true
2. input the payload inside path.
3.Open this url: https://www.glassdoor.co.in/FAQ/Mic%22%3e%3cimg%20onerro%3d%3e%3cimg%20src%3dx%20onerror%3dalert%601%60%3e
rosoft-Question-FAQ200086-E1651.htm?countryRedirect=true
An alert will be popped up.
## Impact
Using XSS an attacker can steals the victim cookie and can also redirect him to a malicious site controlled by the attacker.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected