Loading HuntDB...

HTML Injection on ████

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by akaki

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
**Summary:** HTML Injection vulnerabilities on █████████ Air Base Site. **Description:** Search value are output without being escaped. HTML Injection via ```Category``` parameter http://█████████/News/Commentaries?Search=security&Category=%22%3E%3Cimage/src=%22//███████/sealift/2011/July/images/Gumbyleaning2.jpg Response HTML ``` <div class="dig_pager"> <a class="dig_pager_button dig_pager_current" href="http://█████████/News/Commentaries/Search/security?Category="><image/src="//████████/sealift/2011/July/images/Gumbyleaning2.jpg"><span>1</span></a> ``` ## Impact - By setting inappropriate contents, the impression of the organization deteriorates. For example, short URLs that set porn images and graphic images are shared by SNS. - GET request can be generated from the victim's browser. For example, there are cases where it is possible to log out a Web service used by the victim. >This discussion is helpful. >http://security.stackexchange.com/a/135548 ## Suggested Remediation Actions Escape HTML before inserting untrusted data into element content. Because WAF is running on this site, I could not do XSS. However, since WAF may be bypassed, I recommend HTML escaping.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic