Stored xss in address field in billing activity at https://shop.aaf.com/Order/step1/index.cfm
High
A
Alliance of American Football
Submitted None
Actions:
Reported by
gujjuboy10x00
Vulnerability Details
Technical details and impact analysis
Dear Team,
**Summary:** [add summary of the vulnerability]
After looking into https://shop.aaf.com/Order/step1/index.cfm i get to know that there is address field is vulnerable to stored xss which can lead to steal any user's cookie and can lead to complete account takeover
**Description:** [add more details about this vulnerability]
## Steps To Reproduce:
1. go to https://shop.aaf.com and click on any products , tshirt
2. add that in cart and click on proceed
3. enter xss payload (a"><svg/onload=prompt(1)> ) in every address field and click on OK proceed
4. xss will popup
## Supporting Material/References:
XSS OWASP
Thanks,
Vishal
## Impact
Stored xss in address field in billing activity at https://shop.aaf.com/Order/step1/index.cfm
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored