Subject: | Regarding Vulnerability Report |
Date: | Wed, 24 Jan 2018 09:25:14 +0530 |
To: | bug-FedEx [...] rt.cpan.org |
From: | Vikash Chaudhary <vv130295 [...] gmail.com> |
Vulnerability Name : Cross site scripting
Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.
By leveraging XSS, an attacker does not target a victim directly. Instead, an attacker would exploit a vulnerability within a website or web application that the victim would visit, essentially using the vulnerable website as a vehicle to deliver a malicious script to the victim’s browser.
How Cross-site Scripting works
In order to run malicious JavaScript code in a victim’s browser, an attacker must first find a way to inject a payload into a web page that the victim visits. Of course, an attacker could use social engineering techniques to convince a user to visit a vulnerable page with an injected JavaScript payload.
In order for an XSS attack to take place the vulnerable website needs to directly include user input in its pages. An attacker can then insert a string that will be used within the web page and treated as code by the victim’s browser.
Vulnerable URL
https://ftn.fedex.com/news/NewsBulletinDisplay.jsp?lang=en%22%20onmouseover %3dalert(document.domain)%20bad%3d%22&url=122917
Vulnerable item
lang
Payload
en%22%20onmouseover%3dalert(document.domain)%20bad%3d%22
How to reproduce this issue 1. Visit this URL
https://ftn.fedex.com/news/NewsBulletinDisplay.jsp?lang=en%22%20onmouseover %3dalert(document.domain)%20bad%3d%22&url=122917
2. Move your Mouse to Signup for Bulletin it will alert a xss popup
Kindly Refer Detailed Report attached in attachment
Message body not shown because it is not plain text.