Loading HuntDB...

Reflected xss on websummit.net

W
WebSummit
Submitted None
Reported by rubyroobs

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hey guys, **TL;DR:** Reflected XSS on `websummit.net/attendees/featured-attendees` as the `q` parameter is directly reflecting special characters in the `data-url` on the handlebars template section of the page, as opposed to URL encoding them. **Proof of Concept:** Visit [https://websummit.net/attendees/featured-attendees?q=rubyoob%27%3E%3Ciframe/onload=alert(document.domain)%3E%3C/iframe%3E](https://websummit.net/attendees/featured-attendees?q=rubyoob%27%3E%3Ciframe/onload=alert\(document.domain\)%3E%3C/iframe%3E]). I've tested this on all modern browsers (latest Chrome, Firefox and Edge). **Mitigation:** To mitigate this issue, I'd recommend URL encoding special characters when creating the `data-url` parameter server-side. At the moment, visiting my proof of concept would generate HTML like: `<script id="fa-list" class='api-json' data-target='#attendees' data-url='https://api.cilabs.net/v1/conferences/ws16/info/attendees?limit=25&q=rubyoob'><iframe/onload=alert(document.domain)></iframe>,' type='text/x-handlebars-template' data-page="1">` It should be generating something similar to: `<script id="fa-list" class='api-json' data-target='#attendees' data-url='https://api.cilabs.net/v1/conferences/ws16/info/attendees?limit=25&q=rubyoob%27%3E%3Ciframe%2Fonload%3Dalert(document.domain)%3E%3C%2Fiframe%3E,' type='text/x-handlebars-template' data-page="1">` This would allow all API requests to go through without interruption and stop attackers from executing arbitrary javascript on the page. Cheers, @rubyroobs

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic