Content Spoofing on link.greenhouse.io
G
Greenhouse.io
Submitted None
Team Summary
Official summary from Greenhouse.io
This issue is affects one of our upstream vendors and we forwarded the report over to them.
Actions:
Reported by
0xorigin
Vulnerability Details
Technical details and impact analysis
Hi,
#Description:
Content spoofing, also referred to as content injection or virtual defacement, is an attack targeting a user made possible by an injection vulnerability in a web application. When an application does not properly handle user supplied data, an attacker can supply content to a web application, typically via a parameter value, that is reflected back to the user. This presents the user with a modified page under the context of the trusted domain.
#Steps To Reproduce:
1- Go to http://link.greenhouse.io
2- Add %0D%0AContent-Type%3A text%2Fhtml%0D%0A%0D%0AIt has been changed by a new one https://www.Attacker.com so go to the new one since this one . after / in link .
#Impact:
This attack is typically used as, or in conjunction with, social engineering because the attack is exploiting a code-based vulnerability and a user's trust.
spoofing a lot of users .
#Suggested fix:
just use a 404 page that don't include attacker text .
I hope you will fix this issue as soon as possible .
Thank you so much .
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Violation of Secure Design Principles