Self XSS leads to blind XSS and Reflected XSS
quality 5/10 · average
0 net
AI Summary
A bug bounty hunter demonstrates chaining self-XSS to blind XSS in an admin panel via HTML entity encoding bypass, then discovers a reflected XSS on an undiscovered subdomain using KNOXSS payload analysis, earning $700 total. The writeup focuses on practical payload techniques and methodology rather than detailed technical analysis.
Tags
Entities
KNOXSS
Sublist3r
Skeletorkeys
Friendly
Self XSS leads to blind XSS and reflected XSS. | by Friendly - Freedium
Milestone: 20GB Reached
We’ve reached 20GB of stored data — thank you for helping us grow!
Patreon
Ko-fi
Liberapay
Close
< Go to the original
Self XSS leads to blind XSS and reflected XSS.
In regards to this tweet: https://twitter.com/Skeletorkeys/status/1026497897871884289
Friendly
Follow
~3 min read
·
August 6, 2018 (Updated: August 10, 2018)
·
Free: Yes
Important Note:
This website does not want me to disclose their website name,until they have setup their Bounty Program, which I will disclose in the future if they allow me to — or they will likely do it themselves from my interpretation on what they said. However in this post, I will explain to my best knowledge on how KNOXSS plays a role here, how I got a blind XSS through a self XSS and a reflected XSS.
If you message me on Twitter for help, then I will try my best to assist you! But regarding this website will be a straight NO. My reason is simple for that: I do not want to break their privacy nor lose my contact with them, or any other future bounties this website has to offer me.
I don't expect this to work for everyone, or some of you since each websites WAF security is different than-one-and-another — and how it works.
Now to the fun part:
To XSS yourself on this website was the most trickiest part and difficult part. When I tried to input the following tags : ", ', ><, / and \ — I saw that they were being filtered in their live support chat and wasn't being rendered in at all. After spending 20 - 30 mins, I tried some HTML entities and I saw my outputs being rendered in regular tags, so I decided to cook up an image tag XSS.
That being said, I used the following HTML entities: ">
and my output became ">
which then gave me this:
OUR MAGICAL CONFIRMATION "1" :D
Then their live support team member messaged me saying: "Hey did you send a popup box with a message saying "1", and I responded with "Yes I did." That moment I knew I had a blind XSS which reflects back into their Admin Panel.
So I quickly cooked up another payload to grab their cookies — the big boys cookies. That moment I knew I had access to their Administrators and Devs account. I swiftly contacted them and their Administrators again and I was asked me if I could login as them and give a proof of concept — which I did.
Logged in and changed their names to my name for a bit more proof of concept. They were shocked.
They asked me for my PayPal to send me a lil something, something. ;)
I was awarded $500 for this with the reason "Security Guy." Ha.
However, I didn't stop there. Next part is using KNOXSS and Sublist3r —
I used Sublist3r which helped me locate and able to find all their subdomains. I found one of their subdomain http://search.websitename.com which wasn't listed on their website at all and it wasn't secured at all. Just had a search box, a bunch of outdated information.
First I tried ">