vodien.com Cross Site Scripting vulnerability OBB-2037311

2021-06-04T09:24:00
ID OBB:2037311
Type openbugbounty
Reporter raviakp1004
Modified 2021-07-04T09:24:00

Description

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has:

&nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence;
&nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence.

Affected Website:| vodien.com
---|---
Open Bug Bounty Program:| Create your bounty program now. It's open and free.
Vulnerable Application:| Custom Code
Vulnerability Type:| XSS (Cross Site Scripting) / CWE-79
CVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N]
Disclosure Standard:| Coordinated Disclosure based on ISO 29147 guidelines
Discovered and Reported by:| raviakp1004
Remediation Guide:| OWASP XSS Prevention Cheat Sheet
Export Vulnerability Data:| Bugzilla Vulnerability Data
JIRA Vulnerability Data [ Configuration ]
Mantis Vulnerability Data
Splunk Vulnerability Data
XML Vulnerability Data [ XSD ]

Vulnerable URL:

https: //www.vodien.com/billing-information/x"><sv6

HTTP POST data:

https: //www.vodien.com/billing-information/x"><sv6

Research's Comment:

copy the above URL and paste it in any browser and you get a

Screenshot: vodien.com  vulnerability

Mirror: Click here to view the mirror

Coordinated Disclosure Timeline

Vulnerability Reported:| 4 June, 2021 09:24 GMT
---|---
Vulnerability Verified:| 4 June, 2021 09:32 GMT
Website Operator Notified:| 4 June, 2021 09:32 GMT
a. Using the ISO 29147 guidelines|
---|---
b. Using publicly available security contacts|
c. Using Open Bug Bounty notification framework|
d. Using security contacts provided by the researcher|
x. Using Twitter notification|
Public Report Published [without technical details]:| 4 June, 2021 09:32 GMT
Vulnerability Fixed:| 19 August, 2021 20:41 GMT
---|---