POST /labvantage/rc?command=page
param1
The following steps were used to identify and confirm the reflected XSS vulnerability in the param1
parameter of the POST request to the affected endpoint. The testing was conducted using Burp Suite.
param1
:
param1"><a href="javascript:alert('XSS-All-Params')">ALL THE PARAMETERS ARE VULN TO XSS</a>
Figure 1: The request made by adding the XSS payload to the param1
parameter.
param1
parameter was sent.XSS-All-Params
.Figure 2: The alert appears when the XSS payload is injected into the param1
parameter and the link is clicked.
Reflected XSS vulnerabilities can be exploited by attackers to execute arbitrary JavaScript in the context of a victim's browser. This can lead to various malicious activities, such as: