internshala

1 article
sort: new top best
clear filter
0 7/10

A stored XSS vulnerability in InternShala.com exploited through a JSON endpoint with incorrect text/html content-type header. The attacker bypassed multiple filters (whitespace, forward slashes, alert/prompt functions, parentheses, angle brackets) using character substitution and URL encoding to inject a working XSS payload via the current_city_administrative_area_level_2 parameter.

InternShala.com Noman Shaikh
bugbaba.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 7 hours ago · details