Email Html Injection @https://gigs.indeed.com/

Disclosed by
pphreak_1001's avatar
pphreak_1001
  • Engagement Indeed
  • Disclosed date about 2 years ago
  • Points 5
  • Priority P4 Bugcrowd's VRT priority rating
  • Status Resolved This vulnerability has been accepted and fixed
Summary by pphreak_1001

The domain, https://gigs.indeed.com/ had an email html injection vulnerability on gigsearch. The GET parameter l= was the vulnerable parameter here, When html was injected in it, nothing would be triggered on the webpage but when the gigsearch alert form was filled for Job alert with victim's email, the payload was triggered in received email.

Activity
  1. Kyle_indeed’s avatar
    Kyle_indeed Customer published the disclosure report

    ()

  2. pphreak_1001’s avatar
    pphreak_1001 requested disclosure

    ()

  3. Indeed Jira Integration ’s avatar
    Indeed Jira Integration changed the state to Resolved

    ()

  4. pphreak_1001’s avatar
    pphreak_1001 sent a message

    ()

  5. Kyle_indeed’s avatar
    Kyle_indeed Customer rewarded pphreak_1001

    ()

  6. Kyle_indeed’s avatar
    Kyle_indeed Customer changed the state to Unresolved

    ()

  7. Kyle_indeed’s avatar
    Kyle_indeed Customer rewarded pphreak_1001 5 points

    ()

  8. Kyle_indeed’s avatar
    Kyle_indeed Customer sent a message

    ()

  9. pphreak_1001’s avatar
    pphreak_1001 sent a message

    ()

  10. pphreak_1001’s avatar
    pphreak_1001 sent a message

    ()

  11. sophie_bugcrowd’s avatarbugcrowd logo
    sophie_bugcrowd sent a message

    ()

  12. sophie_bugcrowd’s avatarbugcrowd logo
    sophie_bugcrowd changed the state to Triaged

    ()

  13. pphreak_1001’s avatar
    pphreak_1001 sent a message

    ()

  14. pphreak_1001’s avatar
    pphreak_1001 created the submission

    ()