[parc.informatica.com] Reflected Cross Site Scripting and Open Redirect

Disclosed: 2017-04-29 15:08:23 By bogdantcaciuc To informatica
Medium
Vulnerability Details
Hi ! I just want to report you a vulnerability in your subdomain ,,parc'' **Description** In this link *https://parc.informatica.com/partners/apex/Cloud_chat?endpoint=* the vulnerable parameter is ,,endpoint''. Once the parameter takes the value of a XSS vector or a website link the code is executed after we complete the form. **Steps to reproduce** Go to *https://parc.informatica.com/partners/apex/Cloud_chat?endpoint=javascript:alert(document.domain)* After you complete the form, alert executed document.domain . and Open redirect: *https://parc.informatica.com/partners/apex/Cloud_chat?endpoint=http://evil.com* after you complete the form, you are redirected to evil.com I think it's valid because in your scope is *.informatica.com Thanks for attention !
Actions
View on HackerOne
Report Stats
  • Report ID: 178278
  • State: Closed
  • Substate: resolved
  • Upvotes: 8
Share this report