Reflected Xss https://██████/
Medium
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
0xelkomy
Vulnerability Details
Technical details and impact analysis
Hello security all teams
**Relevant Products/Components:**
last version
**Detailed Description:**
Reflected XSS so have high impact.
**Steps To Reproduce:**
1-go in subdomain
2-and check url if tableau uses
3-Uses you can add this redirect dir in url with Authentication redirect:-
/en/embeddedAuthRedirect.html?auth=blocked:alert(%22xElkomy%22)
**Such as**
https://████████/en/embeddedAuthRedirect.html?auth=blocked:alert(%22xElkomy%22)
**Browsers Verified In:**
all browsers supporting javascript
**Supporting Material/References:**
███
**Access Vector Required for Exploitation:**
no required any access but need only web access :)
**Vulnerability Exists in Default Configuration?:**
yes
**Exploitation Requires Authentication?:**
no need anything
#xElkomy
## Impact
The need for an external delivery mechanism for the attack means that the impact of reflected XSS is generally less severe than stored XSS, where a self-contained attack can be delivered within the vulnerable application itself.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected