Cache Poisoning Allows Zero Interaction Store XSS

Disclosed: 2025-03-22 12:35:11 By samark19 To trendyol
Medium
Vulnerability Details
##Steps To Reproduce: **Attacker Step** 1.Login to your account ``https://www.trendyol.com/en/login`` 2.Then Go to this url ``https://www.trendyol.com/en/account`` 3.Then refresh this page and intercept this request then send to repeater tab 4.Then change **User-Agent:** header value ``</script><img src=1 onerror="Function('ale'+'rt(document.cookie)')()">`` and add **sw.js** paramerter. 5.Send 3 request. **As the victim:** 1.Go to this url ``https://www.trendyol.com/en/account?sw.js`` . Now you can see that store XSS is execute. {F3900026} ## Impact Stored XSS in www.trendyol.com
Actions
View on HackerOne
Report Stats
  • Report ID: 2917062
  • State: Closed
  • Substate: resolved
  • Upvotes: 6
Share this report