Non-persistent XSS at Microsoft -Adesh Kolte

Adesh Kolte
Nov 5, 2017 · 2 min read

Hello Guyzz

I am Adesh Nandkishor Kolte (An Independent Security Resercher From India)

I had found a reflected XSS issue Microsoft, below is the My Writeup.

Vulnerability Type: Non Persistent XSS

Abstract: The affected url is vulnerable to Non-persistent XSS due to which an attacker is able to take over Microsoft account of logged in user.

Affected Url:<script>prompt();<script>

Payload: <script>prompt();</script>

Vulnerability Impact Senario: With Non Persistent Cross Site Scripting(XSS) an attacker can create custom URL with cookie stealing code on visiting which a user’s cookie can be stolen and his account can be hijacked.

Vulnerability Reproduction Steps(POC):

1. Visit the URL “"
2. With the parameter “q=” we can inject our payload.

Brief description of the issue:

This vulnerability is caused due to validation present only on the Search textbox present on the webpage. And no validation is present if we provide the same malicious HTML payload directly through the URL.

Proof of Concept:

Xss by Ak

Hall Of Fame:

Listed in Microsoft Security Resercher Aknowledgment

Hall Of Fame Link:

Thanks For Reading :)

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store