RXSS on https://equifax.gr8people.com on Password Reset page in the username parameter
Medium
E
Equifax-vdp
Submitted None
Actions:
Reported by
miguel_santareno
Vulnerability Details
Technical details and impact analysis
Hello,
While testing your program i came across a website that is owned by informatica and is vulnerable to RXSS on Password Reset page in the username parameter
POC:
https://equifax.gr8people.com/index.gp?method=cappportal.showPortalValidateChangePasswordCode&username=%27%22%3E%3Cimg%20src=x%20onerror=alert(1)%3E
Payload:'"><img src=x onerror=alert(1)>
works both on firefox and chrome.
firefox.png and chrome.png
Note that we can observe that the domain belongs to informatica by the footer of the page "© 2019 Equifax, Inc. All rights reserved."
regards
miguel santareno
## Impact
Attackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected