SSL-protected Reflected XSS in m.uber.com

Disclosed: 2017-12-26 11:03:42 By gregoryvperry To uber
Critical
Vulnerability Details
## Summary m.uber.com is susceptible to reflected XSS ## Security Impact A malformed URL can be used to render arbitrary SSL-protected web pages from m.uber.com ## Reproduction Steps https://m.uber.com/?bjbxm%3c%2fscript%3e%3cscript%3ealert(1)%3c%2fscript%3exrii5=1 ## Specifics From the rendered web page: ``` {"enabled":true,"sid":"bbc661585c424072","url":"www.cdn-net.com","cf":1022963},"queryParams":{"bjbxm</script><script>alert(1)</script>xrii5":"1"} ``` No further efforts were made to render a more believable webpage as the vulnerability and reflected code above is sufficient to trigger Chromium Browser's XSS _Auditor protections. ## Impact An attacker could render arbitrary SSL-protected web pages from m.uber.com, to capture user login credentials and passwords, credit card numbers and related payment information, etc.
Actions
View on HackerOne
Report Stats
  • Report ID: 296701
  • State: Closed
  • Substate: duplicate
  • Upvotes: 3
Share this report