Skip to content

Commit

Permalink
Merge branch 'master' into Pen-Test-Reporting-Fixes
Browse files Browse the repository at this point in the history
  • Loading branch information
RRudder authored Nov 24, 2023
2 parents 04536c6 + f188222 commit 0587f58
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand All @@ -25,6 +25,6 @@ Application-level DoS can result in indirect financial loss for the business thr

## Proof of Concept (PoC)

The screenshot below demonstrates the Denial of Service:
The screenshot(s) below demonstrate(s) proof of the vulnerability:

{{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,11 @@

## Overview of the Vulnerability

Stored Cross-Site Scripting (XSS) is a type of injection attack where malicious JavaScript is injected into a website. When a user visits the affected web page, the Javascript executes within that user’s browser in the context of this domain. Stored XSS can be found on this domain which allows an attacker to submit data to a form and escalate from no privileges to any user type, which could include an Administrator level user.
Stored Cross-Site Scripting (XSS) is a type of injection attack where malicious JavaScript is injected into a website. When a user visits the affected web page, the JavaScript executes within that user’s browser in the context of this domain. Stored XSS can be found on this domain which allows an attacker to submit data to a form and escalate from no privileges to any user type, which could include an Administrator level user.

When an attacker can control code that is executed within a user’s browser, they are able to carry out any actions that the user is able to perform, including accessing any of the user's data and modifying information within the user’s permissions. This can result in modification, deletion, or theft of data, including accessing or deleting files, or stealing session cookies which an attacker could use to hijack a user’s session.

to create a crafted JavaScript payload. When a user navigates to the page, the arbitrary Javascript executes within that user’s browser in the context of this domain.
to create a crafted JavaScript payload. When a user navigates to the page, the arbitrary JavaScript executes within that user’s browser in the context of this domain.

## Business Impact

Expand Down

0 comments on commit 0587f58

Please sign in to comment.