Reflected XSS Made Easy: Catching Real Bugs in the Wild
反射型跨站脚本(XSS)是一种通过用户输入直接在HTTP响应中回显的漏洞,常见于URL参数、搜索栏等位置。攻击者可构造恶意链接诱导用户访问,在浏览器中执行恶意脚本。本文通过MTN集团网站的真实案例展示了如何利用简单payload发现此类漏洞,并强调了其潜在风险。 2025-8-5 08:33:44 Author: infosecwriteups.com(查看原文) 阅读量:12 收藏

How a Simple Payload Uncovered a Real Vulnerability on MTN’s Website

Monika sharma

Zoom image will be displayed

Cross-Site Scripting (XSS) remains one of the most impactful yet overlooked vulnerabilities. Among its three primary forms — Reflected, Stored, and DOM-based — Reflected XSS is often the easiest to find but still capable of causing serious damage when exploited correctly.

In this write-up, we’ll break down what Reflected XSS is, how to identify it during recon, and then walk through a real-world bug report on MTN Group’s website that exposed a critical Reflected XSS via a simple payload — proving that low-hanging fruits still exist.

What is Reflected XSS?

Reflected Cross-Site Scripting occurs when user-supplied input is immediately echoed by the application in an HTTP response — without proper encoding or sanitization. This often happens in:

  • URL parameters (GET requests)
  • Search fields
  • Login or message forms
  • Redirect URLs

Unlike stored XSS, where payloads persist in the backend, reflected XSS executes immediately in the browser once the crafted link is visited.


文章来源: https://infosecwriteups.com/reflected-xss-made-easy-catching-real-bugs-in-the-wild-4222376ae3ea?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh