Amit Kumar Biswas @Amitlt2
2 min readApr 2, 2022

SCENARIO OF REFLECTED CROSS-SITE SCRIPTING VULNERABILITY $$$$

Today I’m going to share one of my RXSS Scenarios.

During my hunting on an eccomerce website see what methodology I used for hunting these days. A couple of years ago, I rely on Automation Testing and received a lot of Duplicates & Not Applicable.

Then I started Manual Approach using Google Dorks and try to visit each n every parameter and understand the Blocks of codes.

Suddenly in my target application, I discovered two parameters where I have to enter my address so that for basic tags I used this: Xss<>

Have a look at the title parameter the tag also injected

Now I opened Inspect Element tab and I was shocked that my Xss<> doesn’t sanitize properly Instantly I crafted a Payload which is an image source

<img src=xss onerror=alert(document.domain)>

As you can see the image source payload is injected.

And always remember during testing for XSS vulnerabilities if there was multiple parameters the test like this

Parameter 1:

<img src=xss onerror=alert(1)>

Parameter 2:

<img src=xss onerror=alert(2)>

If any parameters are vulnerable then the pop-up indicates the alert number.

Reported them and got this

Proof of Concept: (VIDEO)

Youtube: https://youtu.be/-rzi12DHYps

Thanks for taking the time to read my write-up and share it with your friends, Like & Follow for more updates.

Follow me:

Instagram

Twitter

Facebook

LinkedIn

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Amit Kumar Biswas @Amitlt2
Amit Kumar Biswas @Amitlt2

Written by Amit Kumar Biswas @Amitlt2

Cyber Security Analyst at @avalanceGlobalSolutions | Security Researcher in | Cyber Security Researcher in Microsoft & Bugcrowd | R&D in Smart Contract |

Responses (2)

Write a response