I’ve found Stored XSS on user edit in name field, actually MatahariMall.com have WAF to protect it, but i found some payload to bypass it.
Location Of Bug :
"'--!><Script /K/>confirm(1)</Script /K/>#
Step To Reproduce :
- Login to your MatahariMall account
- Go to User Edit
- Add your name with Payload
- Save it
It will showing up the XSS and when you access another page, it also will showing up, because the name of your account will be displayed at another page.
- Chrome And Firefox
Team of MatahariMall.com fix the bug after 1 day I send report, Wow!
So, after them patching my previous report i going to bypass it, and i bypass it with new payload.
Payload : –!”><svg/onload=confirm(“1”)>
And it pop up the XSS,
it’s a many way to bypass the firewall.