Cross-site Scripting (XSS) - Reflected in neorazorx/facturascripts
Valid
Reported on
Apr 27th 2022
Description
Reflected cross-site scripting (or XSS) arises when an application receives data in an HTTP request and includes that data within the immediate response in an unsafe way.
Proof of Concept
Turn on debugger mode.
Add path /?<ScRiPt>alert(origin)<%2FScRiPt>
to any endpoint -> script will be reflected, executed and an alert box will show up.
Attackers can add any HTML element, the response will reflected, excuted your code.
Image
Impact
- If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:
+Perform any action within the application that the user can perform.
+View any information that the user is able to view.
+Modify any information that the user is able to modify.
- Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.
- There are various means by which an attacker might induce a victim user to make a request that they control, to deliver a reflected XSS attack. These include placing links on a website controlled by the attacker, or on another website that allows content to be generated, or by sending a link in an email, tweet or other message
Occurrences
We are processing your report and will contact the
neorazorx/facturascripts
team within 24 hours.
a year ago
dungtuanha modified the report
a year ago
dungtuanha modified the report
a year ago
dungtuanha modified the report
a year ago
dungtuanha modified the report
a year ago
We have contacted a member of the
neorazorx/facturascripts
team and are waiting to hear back
a year ago
The researcher's credibility has increased: +7
The fix bounty has been dropped
This vulnerability will not receive a CVE
DebugBar.php#L257-L267
has been validated
to join this conversation