Content Spoofing/Text Injection in https://support.cs.money and JS file not minified and uglyfied which makes it clearly readable

Disclosed: 2020-11-12 13:18:11 By rootishere To cs_money
Low
Vulnerability Details
## Issue 1: Greetings, Hello Team, I have found a Content Spoofing/Text Injection on this domain https://support.cs.money Using the below link the attacker can trick any genuine user to go to the attacker's phishing site. The attacker could craft the URL by providing discounts which will tempt the user to visit the attacker URL mentioned, as the site displaying the message still belongs to https://support.cs.money ## Steps To Reproduce POC URL [support cs money url](https://support.cs.money//.cs.money(!has-moved-to-[www.support.cs.money.in]).Please-visit__[www.cs.money.in]___present__resource) ## Issue 2 - worker.js file is user-readable https://cs.money/js/worker.js?language=en&v=1331&csrf_token=[removed] The worker.js contains a lot of business logic which is deployed in production whiteout being minified or uglified. This might lead an attacker to craft attacks in future as it uses 1. location.href` 2. eval in the below code snipped ``` case 'method': try { postMessage({ cbid: data.cbid, result: eval(`(${data.method})`)() }); } catch (err) { console.warn(err); } break; ``` PoC Screenshots attached. Let me know if you need more information. Cheers! ## Impact Crafted phishing attacks on cs.money
Actions
View on HackerOne
Report Stats
  • Report ID: 997198
  • State: Closed
  • Substate: resolved
  • Upvotes: 27
Share this report