Lucene search

K
huntrR0hansh32EA4DDB-5B41-4BF9-B5A1-EF455FE2D293
HistoryFeb 19, 2022 - 1:06 p.m.

Cross-site Scripting (XSS) - Stored

2022-02-1913:06:22
r0hansh
www.huntr.dev
18

0.001 Low

EPSS

Percentile

21.6%

Description

Stored XSS is a vulnerability in which the attacker can execute arbitrary javascript code in the victim’s browser. The XSS payload is stored in a webpage and it gets executed whenever someone visits that webpage.

I used &#10 (Line Feed character) in the href attribute of <a> tag to bypass the xss checks of invalid_protocols (e.g. javascript:) happening in the application.

Proof of Concept

STEP 1: A low-priv user create a page with the following payload:

<a href>CLICK HERE TO EXPLOIT THIS XSS</a>

STEP 2: Victim visit the page and click on CLICK HERE TO EXPLOIT THIS XSS

XSS alert will show the domain name.

Impact

Attacker can execute arbitrary javascript code in the victim’s browser

0.001 Low

EPSS

Percentile

21.6%

Related for 32EA4DDB-5B41-4BF9-B5A1-EF455FE2D293