[parcel.grab.com] DOM XSS at /assets/bower_components/lodash/perf/
Medium
G
Grab
Submitted None
Actions:
Reported by
thsa
Vulnerability Details
Technical details and impact analysis
**Summary:** DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim’s browser used by the original client side script, so that the client side code runs in an “unexpected” manner ([Source](https://www.owasp.org/index.php/DOM_Based_XSS))
**Description:** It is observed in https://parcel.grab.com/assets/bower_components/lodash/perf/ endpoint that the value given in ```build``` and ```other``` GET parameters are accessed by client side script and written on page using ```document.write``` without output encoding - resulting DOM XSS.
Vulnerable client side cod in page:
{F202292}
which will track back to script source - in switch default value has been set to ```build``` which will be same as user injected in parameter.
(Script link: https://parcel.grab.com/assets/bower_components/lodash/perf/asset/perf-ui.js)
{F202294}
## Browsers Verified In:
* Mozilla Firefox (Latest)
## Steps To Reproduce:
Open any of below links in Mozilla Firefox and observe the script execution.
__Injected in ```build``` GET parameter:__
> https://parcel.grab.com/assets/bower_components/lodash/perf/?build=lodash%22%3E%3C/script%3E%3Ch1%3Evagg-a-bond%20is%20here%20:D%3C/h1%3E%3Cimg%20src=1%20onerror=alert(1)%3E&other=lodash
__Injected in ```other``` GET parameter:__
> https://parcel.grab.com/assets/bower_components/lodash/perf/?build=lodash&other=lodash%22%3E%3C/script%3E%3Ch1%3Evagg-a-bond%20is%20here%20:D%3C/h1%3E%3Cimg%20src=1%20onerror=alert(1)%3E
## Supporting Material/References:
Execution Screenshot:
{F202293}
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - DOM