Reflected XSS in Zomato Mobile - category parameter

Disclosed: 2017-06-26 13:03:21 By harry_mg To zomato
Medium
Vulnerability Details
Hi there. I have found a reflected XSS in Zomato.com mobile. This XSS affects mobile users of Zomato. Steps to reproduce: 1. Go to Zomato.com and change your user agent to mobile *(iPhone/Android user agent)* 2. Go to a certain restaurant/place and their photos *(e.g. site: https://www.zomato.com/manila/artsy-cafe-diliman-quezon-city/photos?category=ambience)* 3. Change the value in the ```category``` parameter to an XSS payload: ``` "--><%2Fscript><svg%2Fonload%3D'%3Balert(document.domain)%3B'>``` 4. Final URL will look like this: https://www.zomato.com/manila/artsy-cafe-diliman-quezon-city/photos?category=%22--%3E%3C%2Fscript%3E%3Csvg%2Fonload%3D%27%3Balert%28document.domain%29%3B%27%3E XSS will execute. POC attached. Thanks and I hope you consider and fix this
Actions
View on HackerOne
Report Stats
  • Report ID: 230119
  • State: Closed
  • Substate: resolved
  • Upvotes: 6
Share this report