How PayPal helped me to generate XSS

Pflash Punk
Oct 20 · 2 min read

Hi ,

I was on break for a year because of my dad’s health issue :(
But now I’am back :D

This is my first write up on , its a old finding but may help you ;)

Ok. So one day I was doing some work with my friend and visited PayPal to get a Pay with PayPal button.

I logged in to PayPal and moved to tools section and clicked on PayPal buttons. After clicking PayPal redirected me to

Here we can create buttons.

While generating a button I looked on the URL bar and got excited.

The URL was some thing like this

The banner size was in url .So i decided to test it.

I’ve changed the size to LOL

and got surprised , the width size in embed code changed to LOL

Now what :P
I’ve changed LOL string to a XSS payload and the size became “><img src=x onerror=prompt(1)>

Now the size in embed code became “><img src=x onerror=prompt(1)> . Which means if you’ll use the infected embed code you’ll be greeted by XSS popup :P

Look at the embed code carefully :P

So this accidental XSS gave me 250$ :D

Pflash Punk

Written by

Bug hunter , learner , Security analyst at transcodium :)

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade