Hello Team,  
Greetings. there is list of xss vulnerabilities and Concurrent login  
vulnerabilities are in snapforce  
<> (version 8.3.0)  
*Vulnerability List: *  
1. Stored Cross Site Scripting  
2. Stored Cross Site Scripting thorough UI Redirection.  
3 Concurrent Login are Allowed  
*Effected URL: *  
*Steps to reproduce:*  
1.Login to application using  
2. Goto the Accounts creation location and create new Account.  
3. Fill all required parameters and insert XSS payload in description  
location and save it.  
4. once you saved the xss payload in description location cross site  
scripting payload can execute.  
5. application can redirect to attacker application my case i have  
redirected to page  
6. for more information please see attached file  
• Output encoding: It is recommended to implement ‘output encoding’ to  
convert untrusted input into a safe form where the input is displayed as  
data to the user without executing as code in the browser.  
Java HTML encoding Function  
public static String HTMLEncode(String aTagFragment){  
final StringBuffer result = new StringBuffer();  
final StringCharacterIterator iterator = new  
char character = iterator.current();  
while (character != StringCharacterIterator.DONE )  
if (character == '<') result.append("<");  
else if (character == '>') result.append(">");  
else if (character == '\"') result.append(""");  
else if (character == '\'') result.append("'");  
else if (character == '\\') result.append("\");  
else if (character == '&') result.append("&");  
else {  
//the char is not a special one  
//add it to the result as is  
character =;  
return result.toString();  
• Escaping: Escape all untrusted data based on the HTML context (body,  
attribute, JavaScript, CSS, or URL) that the data will be placed into.  
String safe = ESAPI.encoder().encodeForHTML( request.getParameter( "input"  
) );  
• Filtering input parameter: Positive or "whitelist" input validation with  
appropriate canonicalization is the recommended filtering technique.  
Alternatively, black-list filtering input works by removing some or all  
special characters from your input. Special characters are characters that  
enable script to be generated within an HTML stream. Special characters  
include the following:  
<> " ' % ; ) ( & + -  
JavaScript Codefunction RemoveBad(strTemp) {  
strTemp = strTemp.replace(/\<|\>|\"|\'|\%|\;|\(|\)|\&|\+|\-/g,"");  
return strTemp;