Loading HuntDB...

Reflected Xss bypass Content-Type: text/plain

Medium
P
Python Cryptographic Authority
Submitted None
Reported by ahmed_alwardani

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Hello Team: -------------- 1 - vulnerable subdomain : ci.cryptography.io 2 - after i tested this subdomain i found many payloads injected by me reflected but not executed 3 - so that i taked alook at the response and i found Content-Type: text/plain 4 - so i searched about bypass Content-Type: text/plain and i found this book **cure53** page 73 tell me i can bypass it in IE browser before version 10 POC: ------ - go to https://ci.cryptography.io/adjuncts/20996283/hudsonyfm6u%3Cscript%3Ealert(document.domain)%3C/script%3Epub5j/plugins/favorite/assets.js - you will see this {F397354} - so let's try to install IE version 9 to try xss popup - this is you will see {F397732} something else ; what is the java files main ?! {F397734} ## Impact this method can affect victims that uses the IE browser before version 10 .

Report Details

Additional information and metadata

State

Closed

Substate

Not-Applicable

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected