// DOM XSS Report by DHOYT
//
// 0xC8CA08F4
//
// April 11, 2013
//
//
REPRO
====================
1. USER AGENT = FireFox w/ FireBug
2. Logged In (l)uzer
//
//
PoC's
=====
See Screen Grab named dom-xss-javascript-injection-source-text_datadom_3il_Element.input-sink-jquery-document.write-poc-04112013.txt
//
//
//
//
STACK TRACE
===========
text_datadom_3il_Element.Value
REPLACE
/<(?!area|br|col|embed|hr|img|input|link|meta|param)(([\w:]+)[^>]*)\/>/gi, <$1>$2>
CONCATRIGHT
CONCATLEFT
//
//
INJECTION URL = href= http://www.ebay.com/gds
//
//
VERIFIED EXPLOITABLE SOURCES
-> text_datadom_3il_Element.Value
//
//
VERFIFIED EXPLOITABLE SINKS
-> inner.HTML
//
//
VERIFIED EXPLOITS
-> Reflected DOM XSS
//
OTHER XSS ITEMS IDENTIFIED
-> CookieLoginModel="-alert(1)-"
-> From donations.ebay.com
//
//
Any questions.. let me know..
-D