Loading HuntDB...

Blind Stored XSS Payload fired at the backend on https://█████████/

Critical
U
U.S. Dept Of Defense
Submitted None
Reported by nagli

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
**Summary:** I have just gotten an email notification from my XSSHunter payload that my blind stored XSS has been triggered by an administrator on the █████████ site, in the following URL: ```javascript https://█████/████ ``` Admin IP address: ████████ User-Agent: █████████ Cookies: ```javascript ██████ ``` Injection Image: ███████ DB Creds exposed: ██████████.█████\█████a ## Suggested Mitigation/Remediation Actions Sanitizing the input on the back-end as well ##Best Regards nagli ## Impact Ability to capture administrator action when preforming activities on the back-end. Extractions of DB credentials. Access to private information. Stealing the cookies of the administrator.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored