Loading HuntDB...

Reflected xss on theacademy.upserve.com

Low
U
Upserve
Submitted None
Reported by base_64

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
**Vulnerabilty** *Reflected xss* in (https://theacademy.upserve.com). **STEPS TO REPRODUCE** 1. Go to (https://theacademy.upserve.com/playlists/all-videos/). 2. Click on any video to watch from the playlist and capture the request in burp. 3. you have to capture the request to (https://theacademy.upserve.com/wp-admin/admin-ajax.php?action=load_player&video_id=5742677405001&player_id=B14h0D4OM&type=pc&post_id=2712) 4. then replace the video_id with this payload = r"><BODY%20ONLOAD=alert(1)>. 5. Then see the response in browser and the popup will appear. **NOTE**: *I also attached a video POC* ## Impact With the help of *xss* a hacker or attacker can perform social engineering on users by redirecting them from real website to fake one. hacker can steal their *cookies* and download a **malware** on their system, and there are many more attacking scenarios a skilled attacker can perform with **xss**.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected