HTML Injection in Traveler Profiles
在Target.com的用户资料功能中发现了一个HTML注入漏洞,通过在姓名、地址等字段输入特定代码可显示为HTML元素,影响多个字段并可能引发安全风险。 2025-6-10 06:48:20 Author: infosecwriteups.com(查看原文) 阅读量:12 收藏

Ehtesham Ul Haq

Free Article Link: Click for free!

Hello there!
If you’re someone who enjoys uncovering the hidden quirks of everyday websites, you’re going to find this story interesting. During a routine review of a user profile feature on Target.com, I stumbled across what initially seemed like a harmless visual bug — but it turned out to be a full-blown HTML injection vulnerability. These kinds of issues are easy to overlook because they appear so minor at first glance, yet they can have serious consequences if left unpatched.

Let me take you behind the scenes of what I discovered, how it worked, and why it matters.

I was testing the Traveler List section under the user profile area. This part of the application lets logged-in users add new travelers by submitting personal details like names, addresses, phone numbers, and so on. It’s a pretty standard feature, but when I entered a payload like <h1>hacked</h1> into the First Name field, the result displayed exactly like an HTML header on the frontend.

That’s when I knew: the app wasn’t sanitizing or encoding the inputs properly.

And this wasn’t limited to just one field. The same behavior happened when injecting tags into the last name, address, and even city…


文章来源: https://infosecwriteups.com/html-injection-in-traveler-profiles-e251be22dc7d?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh