HTML injection in "Invite Collaborators"

Disclosed: 2014-04-06 19:10:37 By melvin To relateiq
Unknown
Vulnerability Details
I was able to edit the contents of the "Invite Collaborators" mail, by using HTML code as my first name. By exploiting this vulnerability, an attacker could send an email with custom text/html code from `[email protected]` (from the RelateIQ server) to any recipient. This can be used for phishing attacks (see attachment: example.png). Steps to reproduce: [1] Register as a new user [2] When asked for a name, enter exploit code in first name field (see attachment: step2.png). For this demonstration I will use a simple example: `You have been hacked. Click <a href="http://phishing-site">here</a> to reset your password.<div style="display:none">` [3] Go through the final steps [4] Go to home and send an invite to the target (see attachment: step4.png) The target will now receive the phishing email (see attachment: email.png). In this simple example it is obvious that the email is fake, but better exploit code can be easily written.
Actions
View on HackerOne
Report Stats
  • Report ID: 2735
  • State: Closed
  • Substate: resolved
  • Upvotes: 5
Share this report