Loading HuntDB...

[parc.informatica.com] Reflected Cross Site Scripting and Open Redirect

Medium
I
Informatica
Submitted None
Reported by bogdantcaciuc

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hi ! I just want to report you a vulnerability in your subdomain ,,parc'' **Description** In this link *https://parc.informatica.com/partners/apex/Cloud_chat?endpoint=* the vulnerable parameter is ,,endpoint''. Once the parameter takes the value of a XSS vector or a website link the code is executed after we complete the form. **Steps to reproduce** Go to *https://parc.informatica.com/partners/apex/Cloud_chat?endpoint=blocked:alert(document.domain)* After you complete the form, alert executed document.domain . and Open redirect: *https://parc.informatica.com/partners/apex/Cloud_chat?endpoint=http://evil.com* after you complete the form, you are redirected to evil.com I think it's valid because in your scope is *.informatica.com Thanks for attention !

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic