Loading HuntDB...

HTML INJECTION on coins.state.gov

Low
U
U.S. Department of State
Submitted None
Reported by devdevrl

Vulnerability Details

Technical details and impact analysis

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
##Summary Hi team i hope you are well t is a pleasure to work in your program. I will begin to present the vulnerability that I found it: An html injection on coins.state.gov ##Steps Vulnerable Link : ``` 1.https://coins.state.gov/Errors.aspx?aspxerrorpath=Gxss ``` ***Steps to reproduce *** ###first step : 1. i used gxss and katana like tools to find vulnerable domain : https://coins.state.gov/Errors.aspx?aspxerrorpath=Gxss 2. i tried to xss but no result for now i tried it manually but no result. ###second step : 1.i had an idea to use dalfox tool to try xss or html injection. 2. it work only for html injection 3. a video below can help you to see the result 4. when i refresh the browser and i keep dalfox run there is another payload generated on the page ```bash echo https://coins.state.gov/Errors.aspx?aspxerrorpath=Gxss | dalfox pipe ``` {F2135442} {F2135443} ## Impact It can allow an attacker to modify the page. To steal another person's identity. The attacker discovers injection vulnerability and decides to use an HTML injection attack. Attacker crafts malicious links, including his injected HTML content, and sends it to a user via email

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)