Cross-site-Scripting
Low
P
Paragon Initiative Enterprises
Submitted None
Actions:
Reported by
test_this
Vulnerability Details
Technical details and impact analysis
step:
1: goto https://bridge.cspr.ng/my/account of your account
2. in "Custom Profile field option" check the box and enter xss payload in "display name" field
payload: "p<script>alert('xss')</script>"
3. update the information
4. open the account in INTERNET EXPLORER 11 and xss will executed
note: here server is not sanitize the user input properly,
payload will not work in firefox,chrome browser due to "content-security-policy"
But internet explorer does not Support "Content-Security-Policy" so xss will execut
this is stored xss and the display name will visible to everywhere, so its possible to account takeover of ther user
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored