XSS on ( █████████.gov ) Via URL path
Medium
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
notajax
Vulnerability Details
Technical details and impact analysis
Hi team,
I was able to execute XSS on ███████.gov
Steps to produce -
1 -Turn on the burp intercepter
2- Go to https://██████.gov/xapi/statements?file"><script>alert(document.domain)</script>
3- In Intercepter add the following Headers
Authorization: Basic eGFwaS10b29sczp4YXBpLXRvb2xz
X-Experience-Api-Version: 1.0.1
4- when you send this GET request you will receive a response with XSS payload executed.
## Impact
An attacker can send the malicious link to victims and steals victims' cookie leading to account takeover.
## System Host(s)
www.███.gov
## Affected Product(s) and Version(s)
## CVE Numbers
CVE-2021-41878
## Steps to Reproduce
I have attached the Video POC, please check it out.
## Suggested Mitigation/Remediation Actions
sanitize the inputs in the URL
Related CVEs
Associated Common Vulnerabilities and Exposures
CVE-2021-41878
UNKNOWN
A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console and it is possible to insert a vulnerable malicious button.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected