Skip Menu |

This queue is for tickets about the FedEx CPAN distribution.

Report information
The Basics
Id: 124201
Status: rejected
Priority: 0/
Queue: FedEx

People
Owner: Nobody in particular
Requestors: vv130295 [...] gmail.com
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)



Subject: Regarding Vulnerability Report
Date: Wed, 24 Jan 2018 09:25:14 +0530
To: bug-FedEx [...] rt.cpan.org
From: Vikash Chaudhary <vv130295 [...] gmail.com>
Vulnerability Name : Cross site scripting Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates. By leveraging XSS, an attacker does not target a victim directly. Instead, an attacker would exploit a vulnerability within a website or web application that the victim would visit, essentially using the vulnerable website as a vehicle to deliver a malicious script to the victim’s browser. How Cross-site Scripting works In order to run malicious JavaScript code in a victim’s browser, an attacker must first find a way to inject a payload into a web page that the victim visits. Of course, an attacker could use social engineering techniques to convince a user to visit a vulnerable page with an injected JavaScript payload. In order for an XSS attack to take place the vulnerable website needs to directly include user input in its pages. An attacker can then insert a string that will be used within the web page and treated as code by the victim’s browser. Vulnerable URL https://ftn.fedex.com/news/NewsBulletinDisplay.jsp?lang=en%22%20onmouseover %3dalert(document.domain)%20bad%3d%22&url=122917 Vulnerable item lang Payload en%22%20onmouseover%3dalert(document.domain)%20bad%3d%22 How to reproduce this issue 1. Visit this URL https://ftn.fedex.com/news/NewsBulletinDisplay.jsp?lang=en%22%20onmouseover %3dalert(document.domain)%20bad%3d%22&url=122917 2. Move your Mouse to Signup for Bulletin it will alert a xss popup Kindly Refer Detailed Report attached in attachment

Vulnerability Name : Cross site scripting

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

By leveraging XSS, an attacker does not target a victim directly. Instead, an attacker would exploit a vulnerability within a website or web application that the victim would visit, essentially using the vulnerable website as a vehicle to deliver a malicious script to the victim’s browser.

How Cross-site Scripting works

In order to run malicious JavaScript code in a victim’s browser, an attacker must first find a way to inject a payload into a web page that the victim visits. Of course, an attacker could use social engineering techniques to convince a user to visit a vulnerable page with an injected JavaScript payload.

In order for an XSS attack to take place the vulnerable website needs to directly include user input in its pages. An attacker can then insert a string that will be used within the web page and treated as code by the victim’s browser.

Vulnerable URL

https://ftn.fedex.com/news/NewsBulletinDisplay.jsp?lang=en%22%20onmouseover %3dalert(document.domain)%20bad%3d%22&url=122917

Vulnerable item

lang

Payload

en%22%20onmouseover%3dalert(document.domain)%20bad%3d%22

How to reproduce this issue 1. Visit this URL

https://ftn.fedex.com/news/NewsBulletinDisplay.jsp?lang=en%22%20onmouseover %3dalert(document.domain)%20bad%3d%22&url=122917

2. Move your Mouse to Signup for Bulletin it will alert a xss popup


Kindly Refer Detailed Report attached in attachment 

Download ftn.pdf
application/pdf 191.1k

Message body not shown because it is not plain text.

 

On 2018-01-23 19:55:43, vv130295@gmail.com wrote: Show quoted text
> Vulnerability Name : Cross site scripting
This bug queue is not affiliated with the FedEx company -- please see its website for the proper channel for reporting security issues.