Reflected XSS vulnerability in Ebay.com


Last year (Sept. 2013) I found XSS vulnerability in www.ebay.com. Why writing it up now? Because I didn’t want to “showoff” for reasons. Enough with the drama :D. Let’s get to the point.

Challange Accepted meme

So I was looking at all the names in Hall of fame of different sites. On Ebay’s Security Researcher page, I thought the list is long but I want my name in the list.
So I started playing with all the GET parameters and came to this possibly vulnerable page.

URL: http://www.ebay.in/sch/Coins-Notes-/11116/i.html

Vulnerable parameter: LH_SpecificSeller

Reflected Code:

<span style="display:none"> <span title='XSS'> XSS HERE TOO </span> </span>

List of hurdles:

  • < > and , are removed
  •  Affected area lies within hidden span (display: none / no mouse events)

Because parent span had CSS style display: none , it was not possible to trigger event. Neither it was possible to  make the affected span visible because of the same reason. Though I tried it by adding style attribute. I tried all other payload, say it be onload / onerror events or data: URI in style attribute. But after a little research; OK OK  after 8 hours of research I came upon a CSS expression payload.

http://www.ebay.in/sch/Coins-Notes-/11116/i.html?LH_SpecificSeller=1..xss’+style=”xss:expression(prompt(1))”+id=’1
XSS in Ebay.com

Aaand it worked! Not in Firefox or Google Chrome, but in Internet Explorer. Yes I had to use Internet Explorer because of compulsion. But that was enough for me.

It'ssomething meme

So I reported it and after a month they fixed it and I got a reply from them.

ebay xss reply

and that’s how I got my name in the list. Here it is. :D

ebay whitehat list


Leave a Reply

Your email address will not be published. Required fields are marked *