Loading HuntDB...

Content Spoofing on link.greenhouse.io

G
Greenhouse.io
Submitted None

Team Summary

Official summary from Greenhouse.io

This issue is affects one of our upstream vendors and we forwarded the report over to them.

Reported by 0xorigin

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
Hi, #Description: Content spoofing, also referred to as content injection or virtual defacement, is an attack targeting a user made possible by an injection vulnerability in a web application. When an application does not properly handle user supplied data, an attacker can supply content to a web application, typically via a parameter value, that is reflected back to the user. This presents the user with a modified page under the context of the trusted domain. #Steps To Reproduce: 1- Go to http://link.greenhouse.io 2- Add %0D%0AContent-Type%3A text%2Fhtml%0D%0A%0D%0AIt has been changed by a new one https://www.Attacker.com so go to the new one since this one . after / in link . #Impact: This attack is typically used as, or in conjunction with, social engineering because the attack is exploiting a code-based vulnerability and a user's trust. spoofing a lot of users . #Suggested fix: just use a 404 page that don't include attacker text . I hope you will fix this issue as soon as possible . Thank you so much .

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Violation of Secure Design Principles