HTML Injection in Traveler Profiles
作者在Target.com的用户资料功能中发现了一个HTML注入漏洞。通过在姓名、地址等字段输入恶意代码(如`<h1>hacked</h1>`),前端显示为HTML内容,表明输入未被正确清理或编码。该漏洞存在于多个字段中,可能带来严重安全风险。 2025-6-10 06:48:20 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

Ehtesham Ul Haq

Free Article Link: Click for free!

Hello there!
If you’re someone who enjoys uncovering the hidden quirks of everyday websites, you’re going to find this story interesting. During a routine review of a user profile feature on Target.com, I stumbled across what initially seemed like a harmless visual bug — but it turned out to be a full-blown HTML injection vulnerability. These kinds of issues are easy to overlook because they appear so minor at first glance, yet they can have serious consequences if left unpatched.

Let me take you behind the scenes of what I discovered, how it worked, and why it matters.

I was testing the Traveler List section under the user profile area. This part of the application lets logged-in users add new travelers by submitting personal details like names, addresses, phone numbers, and so on. It’s a pretty standard feature, but when I entered a payload like <h1>hacked</h1> into the First Name field, the result displayed exactly like an HTML header on the frontend.

That’s when I knew: the app wasn’t sanitizing or encoding the inputs properly.

And this wasn’t limited to just one field. The same behavior happened when injecting tags into the last name, address, and even city…


文章来源: https://infosecwriteups.com/html-injection-in-traveler-profiles-e251be22dc7d?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh