FirstBlood-#93 — XSS using ref Parameter
This issue was discovered on FirstBlood v1
On 2021-05-10, mava Level 2 reported:
Hi zseano,
I found a reflected XSS inside Firstblood.
PoC
Impact
This vulnerability allows an attacker to execute arbitrary Javascript code.
Fix
The parameter must be sanitized correctly.
Best regards,
Max
P3 Medium
Endpoint: /register.php
Parameter: ref
Payload: 1%27AutoFocus/ContentEditable/OnFocusIn=_=confirm,_(1)//
FirstBlood ID: 4
Vulnerability Type: Reflective XSS
The parameter "ref" is vulnerable to XSS on register.php. The developer made use of htmlentities but this is inadequate as the HREF is wrapped in single quotes.
Report Feedback
Creator & Administrator
Nice find ! :)