Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
531,818 coordinated disclosures
287,587 fixed vulnerabilities
734 bug bounties with 1,449 websites
14,911 researchers, 1070 honor badges

Are you sure you want to delete the vulnerability?

Yes No

This feature enables you to send additional notifications to the website owners or admins after the vulnerability is submitted. The total number of additional notification is limited to 10, and to 1 in 24 hours.

Notify specific security contact:


To my best knowledge this email belongs to the website owner/admin


washingtonpost.com Cross Site Scripting vulnerability
Open Bug Bounty ID: OBB-687672

Security Researcher MLT Helped patch 2021 vulnerabilities
Received 5 Coordinated Disclosure badges
Received 1 recommendations
, a holder of 5 badges for responsible and coordinated disclosure, found a security vulnerability affecting washingtonpost.com website and its users.

Following coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has:

      a. verified the vulnerability and confirmed its existence;
      b. notified the website operator about its existence.

Affected Website:washingtonpost.com  
Open Bug Bounty Program:Create your bounty program now. It's open and free.
Vulnerable Application:Custom Code
Vulnerability Type:XSS (Cross Site Scripting) / CWE-79
CVSSv3 Score:6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N]
Disclosure Standard:Coordinated Disclosure based on ISO 29147 guidelines
Discovered and Reported by:MLT Helped patch 2021 vulnerabilities
Received 5 Coordinated Disclosure badges
Received 1 recommendations
Remediation Guide:OWASP XSS Prevention Cheat Sheet
Export Vulnerability Data:Bugzilla Vulnerability Data
JIRA Vulnerability Data [ Configuration ]
Mantis Vulnerability Data
Splunk Vulnerability Data
XML Vulnerability Data [ XSD ]

Vulnerable URL:

HTTP POST data:

Mirror: Click here to view the mirror

Coordinated Disclosure Timeline

Vulnerability Reported:18 October, 2018 08:14 GMT
Vulnerability Verified:18 October, 2018 08:55 GMT
Website Operator Notified:18 October, 2018 08:55 GMT
a. Using the ISO 29147 guidelines
b. Using publicly available security contacts
c. Using Open Bug Bounty notification framework
d. Using security contacts provided by the researcher
Public Report Published
[without any technical details]:
18 October, 2018 08:55 GMT
Vulnerability Fixed:16 January, 2019 09:15 GMT
Public Disclosure:  A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability.17 November, 2018 08:14 GMT

For Website Operators and Owners

Please contact the researcher directly to get the vulnerability details. The researcher may also help you fix the vulnerability and advice on how to prevent similar issues:



For remediation best practices, please also refer to OWASP remediation guidelines. More information about coordinate and responsible disclosure on Open Bug Bounty is available here.

DISCLAIMER: As a non-profit project, Open Bug Bounty never acts as an intermediary between website owners and security researchers. Our role is strictly limited to independent verification of the reports and proper notification of website owners by all available means.

washingtonpost.com

Website Overview

Alexa Global Rank:225
SSL/TLS Server Test:A+    View Results
Web Server Security Test:N/A    
Malware Test:Click here
Domain Health Report:Click here

Latest Submissions

OBB-ID Reported by Status Reported on
patched
18.10.2018
patched
25.05.2018
patched
19.10.2017
patched
09.09.2017
patched
29.08.2017
patched
24.08.2017
patched
16.07.2017
patched
14.06.2017
patched
25.05.2017
patched
06.05.2017
unpatched
25.03.2017
patched
31.12.2016
patched
25.12.2016
patched
19.05.2016
patched
03.05.2016
patched
22.09.2015
patched
18.06.2015
patched
30.03.2015
patched
28.06.2014
patched
26.06.2014

  Latest Patched

 01.04.2020 cau.co.me
 01.04.2020 sgcarmart.com
 01.04.2020 deakin.edu.au
 01.04.2020 almanac.com
 01.04.2020 zeit.de
 01.04.2020 litnet.com
 01.04.2020 repubblica.it
 01.04.2020 emcitv.com
 01.04.2020 nw.de
 01.04.2020 web.fnal.gov

  Latest Blog Posts

12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net
10.02.2020 by ismailtsdln
SQL Injection Payload List

  Recent Recommendations

    31 March, 2020
     reinisroz:
Thanks much, anguhari, for providing detailed information about XSS bug, found on our website. Highly recommended and professional security researcher!
    31 March, 2020
     admonaut:
Many thanks for your support and assistance. Good job :-)
    31 March, 2020
     thisismeraul:
Thanks for finding this vulnerability for us. The corporate website is more secure now. Good job!
    31 March, 2020
     reinisroz:
Thanks researcher for pointing out the problems in our website.
    31 March, 2020
     aylab:
Thank you for informing me of the issue you found and being so thorough with your details, finding and fixing the problem would have been hard without it.