// DOM XSS Report by DHOYT // // 0xC8CA08F4 // // April 11, 2013 // // REPRO ==================== 1. USER AGENT = FireFox w/ FireBug 2. Logged In (l)uzer // // PoC's ===== See Screen Grab named dom-xss-javascript-injection-source-text_datadom_3il_Element.input-sink-jquery-document.write-poc-04112013.txt // // // // STACK TRACE =========== text_datadom_3il_Element.Value REPLACE /<(?!area|br|col|embed|hr|img|input|link|meta|param)(([\w:]+)[^>]*)\/>/gi, <$1> CONCATRIGHT CONCATLEFT // // INJECTION URL = href= http://www.ebay.com/gds // // VERIFIED EXPLOITABLE SOURCES -> text_datadom_3il_Element.Value // // VERFIFIED EXPLOITABLE SINKS -> inner.HTML // // VERIFIED EXPLOITS -> Reflected DOM XSS // OTHER XSS ITEMS IDENTIFIED -> CookieLoginModel="-alert(1)-" -> From donations.ebay.com // // Any questions.. let me know.. -D