Reflected Cross site Scripting (XSS) on www.starbucks.com
Medium
S
Starbucks
Submitted None
Actions:
Reported by
cujanovic
Vulnerability Details
Technical details and impact analysis
**Summary:** Reflected Cross site Scripting (XSS) on https://www.starbucks.com/account/signin?ReturnUrl
**Description:** The attacker can execute javascript on the victims account just after the authentication process.
**Platform(s) Affected:**
www.starbucks.com
www.starbucks.ca
www.starbucks.com.br
www.starbucks.co.uk
www.starbucks.de
www.starbucks.fr
## Steps To Reproduce:
1. Open the url: https://www.starbucks.com/account/signin?ReturnUrl=%19Jav%09asc%09ript%3ahttps%20%3a%2f%2fwww%2estarbucks%2ecom%2f%250Aalert%2528document.domain%2529
2. Login
3. The JS will execute on users(victims) account.
## Supporting Material/References:
Screenshot:
{F373210}
## How can the system be exploited with this bug?
The attacker can execute JS code.
## How did you come across this bug ?
I was testing for open redirect vulnerability.
## Recommendations for fix
Content based escaping on the users input, in this case the redirect parameter.
## Impact
The attacker can execute JS code.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected