VMware Official VCDX Reflected XSS
I was browsing the HackerOne bug bounty Project.
I want to try to find the loophole of big Enterprise first! I choose VMware.
Before you begin, see if the VMware vulnerability policy has something to pay attention to, This is what you should pay attention to in participating in any loophole reward program.
After reading the VMware vulnerabilities policy, there is not much to be aware of (or accept those vulnerabilities or those who do not)
In the case of vulnerabilities found in third-party software components used in VMware products, please also notify VMware as described above.
Don’t talk much, we start looking for a loophole.
Because I was using VMware products, I was thinking that each product has a certification expert badge and so on, whether this has, curious to find this site
is a VMware certification expert！！
But there seems to be no place to register. Go to the login page
At first a lot of people will try SQL injection some statements, but I didn’t think too much! Because big companies will not have such a clear loophole exists, the existence of the words have been found out
Based on occupational diseases, I try to enter a XSS string “><img src=x Onerror:alert (1)/>
I use grab data to modify
POST /login HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0
Accept-Encoding: gzip, deflate, br
Indeed request response XSS I’m sure this is a loophole
- 2017/02/13 08:46 Provide vulnerability details to VMware Security Team
- 2017/02/14 11:35 Receive response from Vinay that inspection is in progress
- 2017/03/25 02:09 Yes, it fixes
- 2017/03/31 05:18 Tell me there will be VMware Swag memorabilia