Loading HuntDB...

POST XSS in https://www.khanacademy.org.tr/ via page_search_query parameter

Medium
K
Khan Academy
Submitted None
Reported by miguel_santareno

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hey there, while testing your program I came across a XSS vulnerability in the search area of your website. The vector uses HTTP POST request and the parameter is "page_search_query"" on www.khanacademy.org.tr/arama.asp In the next topics I will demonstrate how you can reproduce the vulnerability found on your website: 1º Go to your website and in the search box insert the following payload: ""--!><Svg/OnLoad=(confirm)(/xss/)> xss.jpg 2º Output of the payload: xss2.jpg 3º Vulnerable code with the payload: `<form class="large-search-form" action="arama.asp" method="post"> <input id="large-search-input" name="page_search_query" class="placeholder simple-input search-input blur-on-esc large-search-bar ui-corner-all" autocomplete="off" value="""--!><Svg/OnLoad=(confirm)(/xss/)>" style="margin-top:0px !important"> <i class="icon-search"></i>` xss3.jpg Exploitability: Attacker sends text-based attack scripts that exploit the interpreter in the browser. Almost any source of data can be an attack vector, including internal sources such as data from the database. Please let me know if you need further explanation or details.​ Best Regards, Miguel Santareno ## Impact Attackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic