Invoice Details activate JS that filled in

Disclosed: 2015-03-30 00:30:49 By sasi2103 To coinbase
Unknown
Vulnerability Details
Hello security team, I found XSS on pending invocation details. (Tested on Firefox). Scenario: 1. Go to https://coinbase.com/merchant_tools?link_type=email_invoice 2. Fill in valid email. 3. Subject; Payment request from "><img src=y onerror=prompt(1)> 4. Total Bitcoin 1 and for order put a "><img src=y onerror=prompt(1)> 5. Description and Customer ID as a "><img src=y onerror=prompt(1)> 6. Send the Invoice. 7. Go to transaction page and click on the pending transaction. 8. XSS will be activate on the total field and form field, mine is From: "><img src=y onerror=prompt(1)> ([email protected]) Attached recording POC. Best Regards, Sasi
Actions
View on HackerOne
Report Stats
  • Report ID: 21034
  • State: Closed
  • Substate: resolved
  • Upvotes: 3
Share this report