partyflock.nl Cross Site Scripting vulnerability

2019-10-31T20:55:00
ID OBB:1006657
Type openbugbounty
Reporter 4N_CURZE
Modified 2019-11-30T20:55:00

Description

Open Bug Bounty ID: OBB-1006657

Security Researcher 4N_CURZE Helped patch 1554 vulnerabilities
Received 7 Coordinated Disclosure badges
Received 14 recommendations
, a holder of 7 badges for responsible and coordinated disclosure, found a security vulnerability affecting partyflock.nl website and its users.

Following coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has:

&nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence;
&nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence.

Affected Website:| partyflock.nl
---|---
Open Bug Bounty Program:| View Open Bug Bounty Program
Vulnerable Application:| Custom Code
Vulnerability Type:| XSS (Cross Site Scripting) / CWE-79
CVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N]
Disclosure Standard:| Coordinated Disclosure based on ISO 29147 guidelines
Discovered and Reported by:| 4N_CURZE Helped patch 1554 vulnerabilities
Received 7 Coordinated Disclosure badges
Received 14 recommendations

Remediation Guide:| OWASP XSS Prevention Cheat Sheet
Export Vulnerability Data:| Bugzilla Vulnerability Data
JIRA Vulnerability Data [ Configuration ]
Mantis Vulnerability Data
Splunk Vulnerability Data
XML Vulnerability Data [ XSD ]

Vulnerable URL:

HTTP POST data:

Cookies:

Research's Comment:

Mirror: Click here to view the mirror

Coordinated Disclosure Timeline

Vulnerability Reported:| 31 October, 2019 20:55 GMT
---|---
Vulnerability Verified:| 31 October, 2019 21:01 GMT
Website Operator Notified via Bug Bounty:| 31 October, 2019 21:01 GMT
Public Report Published
[without any technical details]:| 31 October, 2019 21:01 GMT
---|---
Additional notification email sent:| 3 November, 2019 11:43 GMT
Vulnerability Fixed:| 5 November, 2019 21:18 GMT
---|---
Public Disclosure: A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability.| 30 November, 2019 20:55 GMT
---|---