Loading HuntDB...

XSS on ( █████████.gov ) Via URL path

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by notajax

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Hi team, I was able to execute XSS on ███████.gov Steps to produce - 1 -Turn on the burp intercepter 2- Go to https://██████.gov/xapi/statements?file"><script>alert(document.domain)</script> 3- In Intercepter add the following Headers Authorization: Basic eGFwaS10b29sczp4YXBpLXRvb2xz X-Experience-Api-Version: 1.0.1 4- when you send this GET request you will receive a response with XSS payload executed. ## Impact An attacker can send the malicious link to victims and steals victims' cookie leading to account takeover. ## System Host(s) www.███.gov ## Affected Product(s) and Version(s) ## CVE Numbers CVE-2021-41878 ## Steps to Reproduce I have attached the Video POC, please check it out. ## Suggested Mitigation/Remediation Actions sanitize the inputs in the URL

Related CVEs

Associated Common Vulnerabilities and Exposures

A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console and it is possible to insert a vulnerable malicious button.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected