/labvantage/rc?command=file&file=WEB-CORE/elements/files/filesembedded.jsp&size=32&height=18&width=18
height
, width
The following steps were used to identify and confirm the reflected XSS vulnerability in the height
and width
parameters of the GET request to the affected endpoint. The testing was conducted using Burp Suite.
height
and width
parameters to the URL with the XSS payloads:
height
: height=18';alert("height");'
width
: width=18';alert("width");'
Figure 1: The request made by adding XSS payloads to the height
and width
parameters.
width
Parameterwidth
parameter was accessed.width
was triggered.Figure 2: The alert appears when the XSS payload is injected into the width
parameter.
height
Parameterheight
parameter was accessed.