POST /labvantage/rc?command=file&file=WEB-OPAL/pagetypes/bulletins/sendbulletin.jsp
bulletinurl
, bulletinbody
The following steps were used to identify and confirm the HTML injection vulnerability in the bulletinurl
and bulletinbody
parameters of the POST request to the affected endpoint. The testing was conducted using Burp Suite.
bulletinurl
and bulletinbody
:
bulletinurl
: testURL"><h1><font color=blue>PwnTest</h1><textarea></textarea><a href="
bulletinbody
: Message 1</textarea><h1>pwn</h1><div STYLE="background-image: url();"><textarea>
Figure 1: The request made by adding the HTML injection payloads to the bulletinurl
and bulletinbody
parameters.
HTML injection vulnerabilities can be exploited by attackers to manipulate the structure and content of a web page. This can lead to various malicious activities, such as: