Loading HuntDB...

RXSS on https://equifax.gr8people.com on Password Reset page in the username parameter

Medium
E
Equifax-vdp
Submitted None
Reported by miguel_santareno

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Hello, While testing your program i came across a website that is owned by informatica and is vulnerable to RXSS on Password Reset page in the username parameter POC: https://equifax.gr8people.com/index.gp?method=cappportal.showPortalValidateChangePasswordCode&username=%27%22%3E%3Cimg%20src=x%20onerror=alert(1)%3E Payload:'"><img src=x onerror=alert(1)> works both on firefox and chrome. firefox.png and chrome.png Note that we can observe that the domain belongs to informatica by the footer of the page "© 2019 Equifax, Inc. All rights reserved." regards miguel santareno ## Impact Attackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected