A-A+

Story of a JSON XSS

2018年02月05日 16:41 汪洋大海 暂无评论 阅读 264 views 次

Hi folks,

This post is about of one of my recent my finding in a bug bounty program. I started checking the application for common vulnerabilities but got nothing after spending an hour I came across an endpoint which looks as follows.

If you look at request and response you will see the value of status parameter is reflecting back in the response. So I tried replacing the value of status parameter and same reflected back in the response as shown in below.

What next? Let’s check for XSS with a simple payload as shown in below.

But angle brackets getting filtered, after I tried some encodings but nothing worked. So I was about to give up but suddenly i decided to try array tricks.

So you can see whatever we write inside the round brackets is reflecting back in response as it becomes associated array as follows

Status   Equals JSON object

<haha> Equals Key of JSON object

Test      Equals value JSON object

Let’s check again for XSS with a simple payload

So now angle brackets working for us but what if we apply = here

This will break the query and that is why we are getting null value. Next I tried URL encoding which worked for me as shown in below figure

Now we are all set to make the final payload.

And finally we need a CSRF POC in order to exploit it.

But the userid parameter was impossible to guess although i checked other end-points as well to get userid but don't get success and reported this vulnerability, they fixed it quickly because the entire website was using the same concept to display JSON data. And at last rewarded with decent bounty 😉

Thanks for reading

本文还算不错吧,以前这么测试过,但是始终没碰到这样的站点。

文章来源:http://c0d3g33k.blogspot.jp/2017/11/story-of-json-xss.html

标签:

给我留言