Reflected xss on theacademy.upserve.com
Low
U
Upserve
Submitted None
Actions:
Reported by
base_64
Vulnerability Details
Technical details and impact analysis
**Vulnerabilty**
*Reflected xss* in (https://theacademy.upserve.com).
**STEPS TO REPRODUCE**
1. Go to (https://theacademy.upserve.com/playlists/all-videos/).
2. Click on any video to watch from the playlist and capture the request in burp.
3. you have to capture the request to (https://theacademy.upserve.com/wp-admin/admin-ajax.php?action=load_player&video_id=5742677405001&player_id=B14h0D4OM&type=pc&post_id=2712)
4. then replace the video_id with this payload = r"><BODY%20ONLOAD=alert(1)>.
5. Then see the response in browser and the popup will appear.
**NOTE**: *I also attached a video POC*
## Impact
With the help of *xss* a hacker or attacker can perform social engineering on users by redirecting them from real website to fake one. hacker can steal their *cookies* and download a **malware** on their system, and there are many more attacking scenarios a skilled attacker can perform with **xss**.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected