Reflected Cross-Site Scripting/HTML Injection
Low
I
Informatica
Submitted None
Team Summary
Official summary from Informatica
Researcher identified a mechanism to establish reflected cross site scripting in an external web application. The feature was disabled.
Actions:
Reported by
jak0_
Vulnerability Details
Technical details and impact analysis
The default ASP page at https://███/redirect/default.asp is vulnerable to reflected Cross-Site Scripting in the "url" parameter. To reproduce the issue just visit the following URL and an alert should pop up:
- https://██████████/redirect/?url=%3Cscript%3Ealert(document.domain)%3C/script%3E
It seems that the redirects subdomain is used to forward users to internal resources, so this vulnerability could be used to execute JavaScript in the context of an internal user and use the browser as a proxy or steal credentials for internal resources.
In a practical attack scenario, the XSS payload could change the location of the following VPN endpoints to a phishing site and capture VPN credentials:
- https://██████████
- https://██████
- https://███
## Impact
This vulnerability could be used practically in phishing attacks to proxy traffic through internal users' browsers and ultimately lead to internal credential leaks.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected