logo
DATABASE RESOURCES PRICING ABOUT US

optus.com.au Cross Site Scripting vulnerability OBB-120110

Description

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147](<https://www.iso.org/standard/45170.html>)** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Affected Website:| **[optus.com.au](<https://www.optus.com.au>) ** ---|--- Open Bug Bounty Program:| **Create your bounty program now**. It's open and free. Vulnerable Application:| Custom Code Vulnerability Type:| **[XSS (Cross Site Scripting)](<https://owasp.org/www-community/attacks/xss/>)** / CWE-79 CVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] Discovered and Reported by:| **tbm ** Remediation Guide:| **[OWASP XSS Prevention Cheat Sheet](<https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html>)** Vulnerable URL: https: //www. optus.com.au/customercentre/search --- HTTP POST data: query=</script><script>alert ( 'XSSPOSED')</script>&question= --- **Screenshot:** ![optus.com.au vulnerability](/twimages/screen-120110.jpg) **Mirror:** [Click here to view the mirror](<http://120110.openbounty.org/mirror/>) ### Coordinated Disclosure Timeline Vulnerability Reported:| 25 December, 2015 08:55 GMT ---|--- Vulnerability Verified:| 25 December, 2015 08:57 GMT Website Operator Notified:| 25 December, 2015 08:57 GMT a. Using publicly available security contacts| ![](/images/done.png) ---|--- b. Using Open Bug Bounty notification framework| ![](/images/done.png) c. Using security contacts provided by the researcher| ![](/images/done.png) Public Report Published [without technical details]:| 25 December, 2015 08:57 GMT Vulnerability Fixed:| 17 November, 2021 00:52 GMT ---|---