Vulnerability Summary
Poor HTML sanitization combined with a file upload feature led to a stored XSS that allowed administrator accounts to be compromised.
Let’s refer to the company as A.Corp.
Instead of integrating a third-party chatbot, A.Corp developed its own AI assistant from the ground up:
A DOM-based XSS vulnerability was discovered affecting multiple endpoints within a financial institution's web application. The target_route parameter was being processed client-side without proper validation or sanitization. This flaw allowed an attacker to execute arbitrary JavaScript code by utilizing the javascript: URI scheme.
HackerOne disclosed report --> https://hackerone.com/reports/3608199 by xavlimsg
No comments yet.
Be the first to share your thoughts
Log in to join the discussion.
Sign In