logo
DATABASE RESOURCES PRICING ABOUT US

All Vulnerabilities for backlog.com Patched via Open Bug Bounty

Description

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147](<https://www.iso.org/standard/45170.html>)** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Affected Website:| **[backlog.com](<https://backlog.com>) ** ---|--- Open Bug Bounty Program:| **Create your bounty program now**. It's open and free. Vulnerable Application:| Custom Code Vulnerability Type:| **[XSS (Cross Site Scripting)](<https://owasp.org/www-community/attacks/xss/>)** / CWE-79 CVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] Disclosure Standard:| Coordinated Disclosure based on **[ISO 29147](<https://www.iso.org/standard/45170.html>)** guidelines Discovered and Reported by:| **4N_CURZE ** Remediation Guide:| **[OWASP XSS Prevention Cheat Sheet](<https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html>)** Export Vulnerability Data:| Bugzilla Vulnerability Data JIRA Vulnerability Data [ Configuration ] Mantis Vulnerability Data Splunk Vulnerability Data XML Vulnerability Data [ XSD ] Vulnerable URL: https: //backlog.com/?p="><script>alert (String. fromCharCode(5 --- HTTP POST data: p="><script>alert (String. fromCharCode(52,78,95,67,85,82,90,6 --- Cookies: ~gol_au=1.1.1988272194.1624358279; _ts_yjad=1624358282385; --- Research's Comment: THE PARAMETER "p=" --- **Screenshot:** ![backlog.com vulnerability](/twimages/screen-2087146.jpg) **Mirror:** [Click here to view the mirror](<http://2087146.openbounty.org/mirror/>) ### Coordinated Disclosure Timeline Vulnerability Reported:| 14 July, 2021 13:35 GMT ---|--- Vulnerability Verified:| 14 July, 2021 13:43 GMT Website Operator Notified:| 14 July, 2021 13:43 GMT a. Using the ISO 29147 guidelines| ![](/images/done.png) ---|--- b. Using publicly available security contacts| ![](/images/done.png) c. Using Open Bug Bounty notification framework| ![](/images/done.png) d. Using security contacts provided by the researcher| ![](/images/done.png) x. Using Twitter notification| ![](/images/done.png) Public Report Published [without technical details]:| 14 July, 2021 13:43 GMT Vulnerability Fixed:| 13 October, 2021 03:39 GMT ---|---