Loading HuntDB...

XSS on Meta Tag at https://m.olx.ph

O
OLX
Submitted None
Reported by yappare

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hi, There is improper validation at q parameter on https://m.olx.ph/ where it can be manipulated by an attacker to include his/her XSS payload to execute javascript code. As example: ``https://m.olx.ph/all-results?q=0;url=blocked:text/html;base64,PHNjcmlwdD5hbGVydCgndGVzdDMnKTwvc2NyaXB0Pg" HTTP-EQUIV="refresh" a="a`` Where once opened the above URL, once refreshed, a Javascript popup will appear. This is because, from the XSS payload used, the Meta tag was properly closed with " character and then it was supplied with a redirect script which already encoded in Base64 format. Where if decoded, it is actually ``<script>alert('test3')</script>``

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic