/labvantage/rc?command=file&file=WEB-CORE/elements/files/filesembedded.jsp&size=32&height=18&width=18height, widthThe following steps were used to identify and confirm the reflected XSS vulnerability in the height and width parameters of the GET request to the affected endpoint. The testing was conducted using Burp Suite.
height and width parameters to the URL with the XSS payloads:
height: height=18';alert("height");'width: width=18';alert("width");'
Figure 1: The request made by adding XSS payloads to the height and width parameters.
width Parameterwidth parameter was accessed.width was triggered.
Figure 2: The alert appears when the XSS payload is injected into the width parameter.
height Parameterheight parameter was accessed.