How I was able to find 4 Cross-site scripting (XSS) on vulnerability disclosure program ?
source: https://medium.com/@DrakenKun/how-i-was-able-to-find-4-cross-site-scripting-xss-on-vulnerability-disclosure-program-e2f39199ae16
Last updated
source: https://medium.com/@DrakenKun/how-i-was-able-to-find-4-cross-site-scripting-xss-on-vulnerability-disclosure-program-e2f39199ae16
Last updated
Hello I’m Amr Mustafa AKA DrakenKun
Today I’ll explain how I found these reflected XSS vulnerabilities
First I will list the tools that I used during this process :-
ParamSpider
gau
kxss
Arjun
Let’s say our domain name called example.com
I used ParamSpider for finding some interested parameters
We got a large number of parameters , now in the final output we can see every reflected parameters and unfiltered values. And here comes the role of kxss tool
I just typed :
The vulnerable parameter for XSS should have Unfiltered : [“ ‘ < > $ | ( ) ` : ; { } ]
I noticed here that I got 2 interested vulnerable parameters named “goto” in different endpoints
let’s say the 2 links are
example.com/login.jsp?goto=
2. cloud.example.com/login.html?goto=
Just visited the url and injected my simple payload in the parameter
Also typed the same payload in the other url and javascript did his job :)
I reported these two vulnerabilities in Bugcrowd with some kind of satisfaction
After exactly 1 day
I asked myself , ok now if you got 2 vulnerable parameters both of them called “goto“ and possible for XSS
how about try finding more of any parameter has the same name ?!!
I simply used google dorks
typed ..
I got some results but unfortunately aren’t vulnerable !
gave another chance ..
Quite simply, all I want is finding any parameter called “goto” to get any chance for finding new XSS’s
I visited every results and start inject javascript payloads
and guess what happened ?
Yeah :)
got the third XSS with some basic payload to Bypass the WAF
Now we got 3 :D
The 3 XSS’s are in 3 different endpoints
I visited them again and start finding any parameters for testing
Here I used tool called Arjun
I got some parameters here and start inject every one of them
one of these parameters is called “SPID” , I noticed that both characters “< >” are refelcted on the source code !
And I quickly start typing my payload
And Boom !!
I tried that with the other endpoints but I found nothing
I reported these 4 vulnerabilities and Alhamdulillah all of them accepted as Unresolved
Thank U ❤
I used beautiful tool called
get all urls (gau) fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, Common Crawl, and URLScan for any given domain. Inspired by Tomnomnom's .
You can follow me in to get some useful informations