[network.informatica.com] The login form XSS via the referer value

Disclosed: 2017-05-22 04:08:13 By s_p_q_r To informatica
High
Vulnerability Details
The **referer** parameter value https://network.informatica.com/login!input.jspa?referer=%ref% is inserted into the Javascript code ```javascript if (pageURL.indexOf("login!input.jspa?referer=") > -1 || pageURL.indexOf("login.jspa?referer=") > -1) { finalPageURL='%ref%'; } ``` and used in further redirection without validation: ```javascript InfaAutoLogin.authenticateUser(response.id, finalPageURL, { callback:function(responseMap) { if(responseMap['status'] === 'success') { document.location = responseMap['location']; } else { sessionStorage.setItem('autoLoginType', responseMap['statusMsg']); } } }); ``` This means an attacker can put JS links there, which will cause script execution in the victim's browser: 1. Log into your Informatica Network account 2. Go to https://network.informatica.com/login!input.jspa?referer=javascript:alert(document.domain) {F142238} Tested with latest Firefox and Chrome.
Actions
View on HackerOne
Report Stats
  • Report ID: 190016
  • State: Closed
  • Substate: resolved
  • Upvotes: 6
Share this report