Stealing local storage data through XSS

 Stealing local storage data through XSS

In this blog, I'm going to show how to steal local storage data and one of my same finding on bugcrowd.😀
See screen shot below which is storing sensitive data in Local Storage.

Its easy to steal this Local stored data through javascript localStorage.getItem() function.
lets alert this data through console for demonstration.

Payload : alert(localStorage.getItem('access_token'))

I have found same challenge previously on bugcrowd private program.  Authorisation token was responsible to handle web application session but they are storing that authorisation token in local storage. which is not a good way to protect session tokens. 
So i manged to find Stored XSS on that program and that XSS is getting executed on Admin Account. Bingo !! 😜 it take me 2 min to craft payload and steal that authorisation token. ezpz 😎 I submitted that vulnerability as Stored XSS to Admin Account Takeover. 😅

Final  Payload :  <img src=x onerror="d…
OLX Reflected XSS on Resend Code link !! 

This is my first write up ! sharing is caring !!  😎         This is not big finding , just one of my noob xss that i have found on
To change password , OLX firstly sends OTP to registered phone number and hold on for user to enter OTP number
but on the same page they have provided the link which resend code (which get highlight after some seconds if user failed to enter the code)
so i checked the request and response of that resend code functionality and its pretty sending mobile number and hash as parameter ph="phone number" & h="hash"
I changed that default user "ph" value to victims number but no luck because of another parameter "h=xxxxxxxxxxxxxxxxxxxx" (hash) 😫

So after that i decided to test for XSS  on same functionality and found one ! ✌😜

I checked the context and entered payload in "ph" parameter ph=" onmouseover="alert(document.domain)

Here is source code view  …