We got a large number of parameters , now in the final output we can see every reflected parameters and unfiltered values. And here comes the role of kxss tool
I just typed :
cat parameters.txt | kxss
some of interested parameters are found here
The vulnerable parameter for XSS should have Unfiltered : [β β < > $ | ( ) ` : ; { } ]
I noticed here that I got 2 interested vulnerable parameters named βgotoβ in different endpoints
letβs say the 2 links are
example.com/login.jsp?goto=
2. cloud.example.com/login.html?goto=
Just visited the url and injected my simple payload in the parameter
javascript alert !
Also typed the same payload in the other url and javascript did his job :)
I reported these two vulnerabilities in Bugcrowd with some kind of satisfaction
After exactly 1 day
I asked myself , ok now if you got 2 vulnerable parameters both of them called βgotoβ and possible for XSS
how about try finding more of any parameter has the same name ?!!
I simply used google dorks
typed ..
I got some results but unfortunately arenβt vulnerable !
get all urls (gau) fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, Common Crawl, and URLScan for any given domain. Inspired by Tomnomnom's waybackurls.
Quite simply, all I want is finding any parameter called βgotoβ to get any chance for finding new XSSβs
new results
I visited every results and start inject javascript payloads
and guess what happened ?
Yeah :)
got the third XSS with some basic payload to Bypass the WAF
the source code
Now we got 3 :D
The 3 XSSβs are in 3 different endpoints
I visited them again and start finding any parameters for testing
Here I used tool called Arjun
I got some parameters here and start inject every one of them
one of these parameters is called βSPIDβ , I noticed that both characters β< >β are refelcted on the source code !
And I quickly start typing my payload
And Boom !!
The fourth XSS fires !
I tried that with the other endpoints but I found nothing
I reported these 4 vulnerabilities and Alhamdulillah all of them accepted as Unresolved
You can follow me in twitter to get some useful informations