Loading HuntDB...

Reflected Cross-Site scripting in : mtn.bj

High
M
MTN Group
Submitted None
Reported by alimanshester

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Hello Team I have found a Reflected XSS vulnerability in mtn.jb by file name ## Steps To Reproduce: [add details for how we can reproduce the issue] 1. go to : ████ 2. enter any email and press Suivant 3. fill all the inputs by any data . 4. in file upload upload any photo with payload file name : "><img src=x onerror=alert(document.cookie);.jpg 5 . the payload executed in the page Supporting Material/References: 1 - video showing poc 2 - screenshot ## Impact An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected