jdpower.com Cross Site Scripting vulnerability

2016-03-21T14:27:00
ID OBB:142591
Type openbugbounty
Reporter tbm
Modified 2016-04-20T14:27:00

Description

Open Bug Bounty ID: OBB-142591

Security Researcher tbm Helped patch 2364 vulnerabilities
Received 6 Coordinated Disclosure badges
Received 6 recommendations
, a holder of 6 badges for responsible and coordinated disclosure, found a security vulnerability affecting jdpower.com website and its users.

Following coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has:

&nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence;
&nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence.

Affected Website:| jdpower.com
---|---
Open Bug Bounty Program:| Create your bounty program now. It's open and free.
Vulnerable Application:| Custom Code
Vulnerability Type:| XSS (Cross Site Scripting) / CWE-79
CVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N]
Discovered and Reported by:| tbm Helped patch 2364 vulnerabilities
Received 6 Coordinated Disclosure badges
Received 6 recommendations

Remediation Guide:| OWASP XSS Prevention Cheat Sheet

Vulnerable URL:

Screenshot: jdpower.com  vulnerability

Mirror: Click here to view the mirror

Coordinated Disclosure Timeline

Vulnerability Reported:| 21 March, 2016 14:27 GMT
---|---
Vulnerability Verified:| 21 March, 2016 14:29 GMT
Website Operator Notified:| 21 March, 2016 14:29 GMT
a. Using publicly available security contacts|
---|---
b. Using Open Bug Bounty notification framework|
c. Using security contacts provided by the researcher|
Public Report Published
[without any technical details]:| 21 March, 2016 14:29 GMT
Vulnerability Fixed:| 4 August, 2020 14:55 GMT
---|---
Public Disclosure: A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability.| 20 April, 2016 14:27 GMT
---|---