Loading HuntDB...

Reflected XSS | https://████

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by x3ph_

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Summary Hi team, there's a reflected XSS on https://█████████ using the `project` param. There's a WAF in place but it's possible to bypass it. Steps to reproduce 1. Click https://████████/fcgi-bin/release.py?project=aaa%3Ch1%20onauxclick=confirm(document.domain)%3ERIGHT%20CLICK%20HERE 2. Observe the popup showing document.domain when right clicking "RIGHT CLICK HERE" ███ ## Impact The attacker can trigger remote code execution on the victim’s browser, and steal credentials, sessions, and potentially send malware to the victim. ## System Host(s) ███████ ## Affected Product(s) and Version(s) ## CVE Numbers ## Steps to Reproduce 1. Click https://█████████/fcgi-bin/release.py?project=aaa%3Ch1%20onauxclick=confirm(document.domain)%3ERIGHT%20CLICK%20HERE 2. Observe the popup showing document.domain when right clicking "RIGHT CLICK HERE" ## Suggested Mitigation/Remediation Actions

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected