Loading HuntDB...

XSS via referrer parameter

Medium
X
X (Formerly Twitter)
Submitted None
Reported by keer0k

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
# Description Hi, i would like to report an XSS via `javascript` scheme in `https://www.twitterflightschool.com/student/award/[ID]?referer=`, the payload e need just a click of user to be triggered because the link will be placed in `a` tag. url:`https://www.twitterflightschool.com/student/award/███?referer=blocked:alert(document.domain)` I attached a video demonstration: {F818801} # Steps to reproduce 1. go to `https://www.twitterflightschool.com/student/award/████████?referer=blocked:alert(document.domain)` 2. click in "X" button in top left of the screen 3. XSS will be triggered ## Impact it is possible to perform malicious actions on the victim's account

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected