Overview:
Trigger XSS using portfolio name.
What Had to be done?
OK, at First I used different payloads in the Portfolio name but nothing triggered, but after some more research I found that after I create my Portfolio payload and click on one of these Deposit / Withdraw my Portfolio name is inserted into this function
function initPage() {
initVars();
dview = google.finance.portfolio.init({
id: '8',
expected_hash: 'U66jb3VTR2ZPUjgtaXJqaXRZc2s33VNmVWdjfDEyOTc4NzE22NDk',
edition: 'us',
name: '--XSS PAYLOAD--',
currency: 'USD'
}, true,
'/finance/s/7skxqAM7Z8M/chart9.swf?hl=en&gl=us',
true
,
false,
''
);
name: '--XSS PAYLOAD--' , so I inserted this payload as portfolio name: </script><body onload=alert(1)> there was a filter that when you insert this </script> the server removed everything before the </script>I appreciate the opportunity to preserve my skills and gain some more experience
Thank you Google security team.

Do you got a reward for that bug?
ReplyDeleteThe Answer is no, this is the first one I found and just wanted to share the finding,
ReplyDeleteGoogle Security Team acknowledged me that someone else reported this issue before i have.
Hey Ben,
ReplyDeleteI asked because I was the guy who reported the issue before.
Btw. I checked the bug again right now. And the fix is incomplete. 8-)
thanks
ReplyDelete