Cross Site Scripting (Reflected) on https://www.acronis.cz/dotaznik/roadshow-2020/
Low
A
Acronis
Submitted None
Actions:
Reported by
darkdream
Vulnerability Details
Technical details and impact analysis
You can post javascript code in form fields
## Summary
[add summary of the vulnerability]
## Steps To Reproduce
[add details for how we can reproduce the issue]
steps :
1-go to vulnerability link : https://www.acronis.cz/dotaznik/roadshow-2020/
2- enter this javascript code "><script>alert(1);</script> in form field
1. [add step]
1. [add step]
1. [add step]
## Recommendations
[add details for how to fix or at least mitigate the issue]
## Impact
If an attacker can control a script that is executed in the victim's browser
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$50.00
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected