FirstBlood-#93XSS using ref Parameter



On 2021-05-10, mava reported:

Hi zseano, I found a reflected XSS inside Firstblood.

PoC

  1. Visit: http://firstbloodhackers.com:49331/register.php?ref=1%27AutoFocus/ContentEditable/OnFocusIn==confirm,(document.domain)//

Impact

This vulnerability allows an attacker to execute arbitrary Javascript code.

Fix

The parameter must be sanitized correctly.

Best regards,
Max

P3 Medium

Endpoint: /register.php

Parameter: ref

Payload: 1%27AutoFocus/ContentEditable/OnFocusIn=_=confirm,_(1)//


FirstBlood ID: 4
Vulnerability Type: Reflective XSS

The parameter "ref" is vulnerable to XSS on register.php. The developer made use of htmlentities but this is inadequate as the HREF is wrapped in single quotes.

Report Feedback

@zseano

Creator & Administrator


Nice find ! :)


Respect Earnt: 1000000
RESPECT ($RSP) is an experimental cryptocurrency based on the Ethereum blockchain with the mission to show respect to those who deserve it. We are testing it out on our FirstBlood hackevent.