logo
DATABASE RESOURCES PRICING ABOUT US

interempresas.net Cross Site Scripting vulnerability OBB-2042340

Description

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147](<https://www.iso.org/standard/45170.html>)** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Affected Website:| **[interempresas.net](<https://www.interempresas.net>) ** ---|--- Open Bug Bounty Program:| **Create your bounty program now**. It's open and free. Vulnerable Application:| Custom Code Vulnerability Type:| **[XSS (Cross Site Scripting)](<https://owasp.org/www-community/attacks/xss/>)** / CWE-79 CVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] Disclosure Standard:| Coordinated Disclosure based on **[ISO 29147](<https://www.iso.org/standard/45170.html>)** guidelines Discovered and Reported by:| **howardpotts ** Remediation Guide:| **[OWASP XSS Prevention Cheat Sheet](<https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html>)** Export Vulnerability Data:| Bugzilla Vulnerability Data JIRA Vulnerability Data [ Configuration ] Mantis Vulnerability Data Splunk Vulnerability Data XML Vulnerability Data [ XSD ] Vulnerable URL: https: //www. interempresas .net/buscador/?Q="><svg/onload=prom --- HTTP POST data: Request=search --- Research's Comment: Feel free to contact me on moovakad1997@gmail.com to know --- **Screenshot:** ![interempresas.net vulnerability](/twimages/screen-2042340.jpg) **Mirror:** [Click here to view the mirror](<http://2042340.openbounty.org/mirror/>) ### Coordinated Disclosure Timeline Vulnerability Reported:| 7 June, 2021 16:05 GMT ---|--- Vulnerability Verified:| 7 June, 2021 16:21 GMT Website Operator Notified:| 7 June, 2021 16:21 GMT a. Using the ISO 29147 guidelines| ![](/images/done.png) ---|--- b. Using publicly available security contacts| ![](/images/done.png) c. Using Open Bug Bounty notification framework| ![](/images/done.png) d. Using security contacts provided by the researcher| ![](/images/done.png) x. Using Twitter notification| ![](/images/done.png) Public Report Published [without technical details]:| 7 June, 2021 16:21 GMT Vulnerability Fixed:| 20 May, 2022 18:48 GMT ---|---