I Found a Bug in Internal Testing: Stored XSS in KYC Form Address Field
作者在测试交易平台的KYC表单时发现地址字段存在XSS漏洞:输入HTML或脚本后被系统接受,并在用户资料中触发恶意代码。这凸显了输入验证的重要性——通过白名单过滤合法输入,防止恶意注入攻击。 2025-7-7 14:15:13 Author: infosecwriteups.com(查看原文) 阅读量:16 收藏

Yamini Yadav

Image by Pixabay

When an Address Field Became an XSS Bug Bounty

It was just another Tuesday of internal testing on our trading platform when I stumbled on something unexpected. I was filling out the KYC form for a test user — you know, the usual Name, Address, ID number — and I thought, “What if I try putting some HTML or script into the Address field?” To my surprise, the app accepted it! Later, when I viewed that user’s profile, the hidden test script I entered popped up an alert. I had discovered a Stored Cross-Site Scripting (XSS) vulnerability in the address field.

This hit me as a reminder of why input validation is so important. Simply put, input validation means checking user-provided data before using it in the application. It’s often called the “first line of defense” in secure development. By validating input (for example, ensuring an address field contains only normal characters and not HTML tags), we prevent malicious code from being injected into our system.

The OWASP Secure Coding guide even advises using a whitelist approach (an allow-list) to define what good input looks like, rather than trying to block bad input, which attackers can often bypass. In short, when we don’t validate inputs properly, we leave openings for all sorts of attacks —…


文章来源: https://infosecwriteups.com/i-found-a-bug-in-internal-testing-stored-xss-in-kyc-form-address-field-4ede43cf99a2?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh