Loading HuntDB...

Reflected XSS on https://www.zomato.com

Medium
Z
Zomato
Submitted None
Reported by strukt

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Hello, I found an XSS issue due to the incorrect handling of the \ character in a <script> context, the following link works as a PoC that alerts the location of the document: https://www.zomato.com/googleOAuth2Callback?)}(alert)(location);{%3C!--&state=\ The issue exists because, given that the \ character supplied as the `state` parameter value is not well escaped and reflected into the page, we are able to use it to escape the " and then inject our own JS code to execute it on the page. Note: This only works when the page is opened by an authenticated user ## Impact This allows an attacker to inject custom Javascript codes that can be used to steal information from Zomato's user base and lure them to malicious websites on the internet on behalf of Zomato's website.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected