FirstBlood-#446 — Reflected XSS on the /register.php endpoint with the ref vulnerable parameter
This issue was discovered on FirstBlood v2
On 2021-10-25, johandu97 Level 4 reported:
Improper input validation leads to attackers injecting malicious characters causing XSS vulnerabilities
- Hi @zseano, I found reflected xss on /register.php endpoint with ref vulnerable parameter
Validate/santize malicious inputs that cause xss like < > ' " ...
FirstBlood ID: 32
Vulnerability Type: Reflective XSS
The parameter ?ref on register.php was poorly fixed and can be bypassed in various ways. Firstly the developer failed to use strtolower() when comparing strings, and the use of characters such as
%09 will also bypass the filter.