Hi there, I am writing to let you know about a security vulnerability I found on your website irosephonline.com.
Vulnerability Overview: Reflected XSS is an injection attack where malicious JavaScript is embedded in a URL. When the URL is visited, the script executes in the victim’s browser, potentially compromising user data and the integrity of the affected site. In this case, the vulnerability allows an attacker to craft a URL that, when accessed, executes arbitrary JavaScript within the context of irosephonline.com. Vulnerability Summary: Vulnerable URL: http://www.irosephonline.com/?a=b1y66&api=dym34&c=p76o7&email=bjl27&enddate=wize6&from=n0l61&keyword=tkrt3&lang=wbs45&list_type=vz7z8&p=s9m66&page=hg733&q=lv1e5&s= "-alert(1)-"&terms=fj8o8&tid=i8xp5&token=lo562&type=v6584&url=p7rp2&username=htd84&year=pchv3 Vulnerable Parameter: s Payload: "-alert(1)-" Description: The application improperly handles user-supplied data in the s parameter on the page http://www.irosephonline.com/?a=b1y66&api=dym34&c=p76o7&email=bjl27&enddate=wize6&from=n0l61&keyword=tkrt3&lang=wbs45&list_type=vz7z8&p=s9m66&page=hg733&q=lv1e5&s="-alert(1)-"&terms=fj8o8&tid=i8xp5&token=lo562&type=v6584&url=p7rp2&username=htd84&year=pchv3. It fails to sufficiently sanitize input before reflecting it back in the HTML response. This allows an attacker to inject malicious JavaScript code into the page. Steps to Reproduce: 1. Open a web browser. 2. Navigate to the following crafted URL: http://www.irosephonline.com/?a=b1y66&api=dym34&c=p76o7&email=bjl27&enddate=wize6&from=n0l61&keyword=tkrt3&lang=wbs45&list_type=vz7z8&p=s9m66&page=hg733&q=lv1e5&s= "-alert(1)-"&terms=fj8o8&tid=i8xp5&token=lo562&type=v6584&url=p7rp2&username=htd84&year=pchv3 3. Expected Result: An alert box should appear in the browser displaying the text XSS Proof of Concept: irosephonline.com, confirming that arbitrary JavaScript execution is possible within the context of your domain. Proof of Concept (PoC): Impact: An attacker could exploit this vulnerability by crafting a malicious link and tricking a logged-in user into clicking it. Successful exploitation could lead to: 1. Session Hijacking: Stealing the user's session cookies to impersonate them. 2. Credential Theft: Tricking users into entering credentials into a fake login form controlled by the attacker. 3. Phishing: Displaying fake messages or forms to deceive users. 4. Content Manipulation/Defacement: Modifying the appearance or content of the page within the user's browser. 5. Redirection: Forwarding users to malicious websites. I am happy to provide further details or assistance if needed. Visit my profile for more information about me https://www.openbugbounty.org/researchers/JKTamim/ *it would be great if you guys could consider a bounty.* Best Regards, J.K Tamim

