Loading HuntDB...

Error Page Content Spoofing or Text Injection

None
J
Judge.me
Submitted None
Reported by tefa_

Vulnerability Details

Technical details and impact analysis

Business Logic Errors
Content spoofing, also referred to as content injection, "arbitrary text injection" or virtual defacement, is an attack targeting a user made possible by an injection vulnerability in a web application. When an application does not properly handle user-supplied data, an attacker can supply content to a web application, typically via a parameter value, that is reflected back to the user. This presents the user with a modified page under the context of the trusted domain. ## Summary: Hello team, When i research i found sensitive path and allow me to inject text and type more words and no limit of the words to write. ## Steps To Reproduce: POC:- 1. Go to https://judge.me/login you will show two type of auth 1-Facebook 2-Google -https://judge.me/auth/google_oauth2 -https://judge.me/auth/facebook 1. Now i can inject any thig after this path auth/***** 1. I can typw words like this website not working by any auth like google or facebook ## Note: I know this vuln is out of scope when this vuln after the path of domain or subdomain but in this case "The auth is the sensitive path and you should fix that by block any words after auth/**" ## How To Fix:- When the attacker type any thing after auth/** you should'nt show the words in the error page and fix that by "404 NOT FOUND" ## Impact This attack is typically used as, or in conjunction with, social engineering because the attack is exploiting a code-based vulnerability and a user's trust. As a side note, this attack is widely misunderstood as a kind of bug that brings no impact.

Report Details

Additional information and metadata

State

Closed

Substate

Not-Applicable

Submitted

Weakness

Business Logic Errors