Today I’m going to share one of my interesting Stored XSS vulnerability found on PayPal Site using XML file upload.
PayPal allows the users to create an invoice and send to the other users. Also allow attaching the file into invoice. So I started trying to upload file with different types of extensions and found that PayPal allows users to upload XML formatted file.
So the next steps I tried for XXE vulnerability but no luck which makes me happy. After couple of test cases I applied, but not found any interesting things to make this vulnerable.
I noticed that if we upload XML file with script tag, which is working perfectly.
<Query>
<SearchTerm>
<script xmlns="http://www.w3.org/1999/
alert(document.cookie);
</script>
</SearchTerm>
</Query>
The exploitation of the bug is very easy. In order to does this attack, create an invoice with xml file and send to victim. When victim open the attached xml file, the script run into his/her browser.
An XML schema definition language is known as a method for constructing schemas. A schema is usually a file needed for defining the structure, content and even semantics of one's XML document. You Can see more in : xml file
ReplyDeleteWhen you are making an Extensible Markup Language or XML file, there are a variety of things that you will need to do
ReplyDeletein order to assure yourself that you are generating and developing a functional file.
You Can see more in : xml file
Hi guys,
ReplyDeleteI also want to share something about the New Attack "XSSJacking"
XSSJacking is a new web-based attack that combines three other techniques — Clickjacking, Pastejacking, and Self-XSS — to steal data from users. Refer the hyper link hope it will be helpful.