How i got idor with xss ;)

Hii everyone today i’ll share the simple bug that i found in July 2019 that allowed me to change user’s First and Last name remotely in Emsisoft main domain. so without wasting more time let’s begin. This is my first ever writeup so there might be some mistakes so please ignore it. :

In July i was testing the Emsisoft.com main domain. after testing a few funtionalities i got some low hanging bugs like no rate limit, ssrf to xspa and few issues which went to be duplicate although Emsisoft is filled with many duplicates.. i was sure i won’t get anything but as the saying goes where there is a will there is a way…I didn’t give up… I kept digging….

After a few days i was checking my secondary email i got newsletter from Emsisoft i was fed-up with their emails as it was spam for me. I was about to unsubscribe the email. as soon as i click on unsubscribe link i got this dashboard

Emsisoft Dashboard

Now i saw that the email field is disabled, we can’t edit email but the name field is enabled that means we can type name and this was vulnerable for xss . I submit the Request with appropriate manner and intercept the request with burpsuite i got this

burpsuite request

Now i guess you may have clear idea what i am going to do here. i change the email with my 2nd account and in name field i typed different name payload in order to recognize properly

image 3 edit email

Now i forwarded the request to server and i check the my 2nd account and my 2nd account’s name was changed

image 4 changed name remotely

Now it was time to try stored xss. i immedietely change the name field with xss payload and forwarded the request But it was not firing on myprofile . but on visiting unsubscribe link

Payload Added
Yayy!! Here’s the popup 😀 😀

Scenario was like if arjunsinghxxx visit the unsubcribe link then xss payload will fire thus it was on name field


They awarded me 100$ because company’s budget was a bit low.

Takeaway:
Always check each and every functionality of the target. There’s always a chance. Never lose hope. Even a small think could make a big difference..
As you can see the payload which i used was very basic. This tells that there’s always a chance. Never lose hope. Keep Digging. You’ll definitely get something…. Happy Hacking 😉
I hope you enjoyed reading..!!


Arjun Singh Sikarvar

Hi All! I Arjun Singh, Synack Red Teamer and Independent Security Researcher , specializing in web application and API' Currently, I am working as a security analyst at payatu, where I am part of the Security Consulting team at Web Security Testing  as well as we perform the Secure Code Review as well

4 thoughts on “How i got idor with xss ;)

  • December 11, 2019 at 4:36 pm
    Permalink

    Keep up the good work and like your blog very much my friend
    Looking forward for more blog and epic bug finiding with you all the best for your future and future work keep grinding looking forward for more
    😎😎😎😎😎

    Reply
    • December 11, 2019 at 4:45 pm
      Permalink

      Thanks For Your Response Share it with your friend too 🙂

      Reply
  • April 28, 2020 at 9:30 am
    Permalink

    Very great post. I just stumbled upon your blog and wished to say that I have truly loved surfing around your weblog posts.
    After all I will be subscribing in your feed and I am hoping you write again very soon!

    Reply
    • April 28, 2020 at 9:45 am
      Permalink

      Sure i will write more blogs

      Reply

Leave a Reply to Abdul Razak Cancel reply

Your email address will not be published. Required fields are marked *