Back to Bug Bounties

Reflected XSS & HTTP Parameter Pollution

web xss hpp pentest

Real-world e-commerce site — HTTP Parameter Pollution leading to Reflected XSS, session hijacking, and cookie exfiltration.

1. Discovery & Proof of Concept

While browsing an e-commerce website as a client, I started playing with the search bar filters (product type, price range, product date). By inserting unexpected characters, I discovered a Reflected Cross-Site Scripting (XSS) vulnerability.

The p_min filter accepted the * character, and entering 5*1 returned products costing at least 5€.

First impression of p_min filter

This led me to test more characters and injection attempts. I discovered the application was vulnerable to HTTP Parameter Pollution: injecting the same parameter twice bypassed server-side filters.

Double p_min parameter Price change with parameter pollution

After several payloads, I achieved a popup leaking session cookies with:

https://target.pt/products/search/pokemon?pmin=10&pmin=alert(document[`coo`%2B`kie`])
Payload in URL Popup with cookie

Other payloads included:

Webhook exfiltration

2. Technical Impact

3. Remediation

4. Conclusion

This case shows how seemingly harmless search filters can be entry points for injection attacks if not properly sanitized. Continuous security testing is essential for e-commerce platforms.