Lack of input sanitization in Marketo form leads to execution of HTML in lead emails
Unknown
Vulnerability Details
Hi,
There is SSRF vulnerability due to img tag injection in "Contact HackerOne Sales" form. Since vulnerability triggers after 18-20 minutes so I am not sure which site it affects. It might affect hackerone or marketo. So I thought it would be better to report it first on hackerone.
**POC**
1. Navigate to https://www.hackerone.com/product/features.
2. Click on "Get Started".
3. Fill FirstName, LastName, Company and Message by <img src=https://yourserver.com/f onerror=alert(1)>, <img src=https://yourserver.com/l onerror=alert(1)>, <img src=https://yourserver.com/c onerror=alert(1)> and <img src=https://yourserver.com/m onerror=alert(1)>.
4. Fill the remaining details and submit the form.
5. Wait 18-20 minutes and check server logs.
In this case ssrf triggers many times. Please check the screenshots.
Thanks
Actions
View on HackerOneReport Stats
- Report ID: 220009
- State: Closed
- Substate: resolved
- Upvotes: 23