[alpha.informatica.com] Expensive DOMXSS

Disclosed: 2017-07-08 09:25:26 By albinowax To informatica
Medium
Vulnerability Details
Hi again, The page at https://alpha.informatica.com/assessmentBase/assessment.html contains the following JavaScript: <script> var baseHeaderElement = '<base href="'+ window.location.pathname + '" />'; $('head').append(baseHeaderElement); </script> An attacker can exploit this using a protocol-relative URL. In Chrome, open the following URL and either proxy though Burp or look at the network tab in the dev console: https://alpha.informatica.com//assessmentBase/assessment.html You will see a failed GET request to https://assessmentbase/etc/designs/informatica-com/assessmentform/js/angular.min.js A sufficiently rich attacker can register assessementbase, and make it serve malicious JavaScript, turning this into a reflected XSS vulnerability. This issue was passively identified by burp suite's code analysis engine.
Actions
View on HackerOne
Report Stats
  • Report ID: 158749
  • State: Closed
  • Substate: resolved
  • Upvotes: 10
Share this report