Lucene search

K
hackeroneAshwaryaH1:31554
HistoryOct 15, 2014 - 4:33 p.m.

X (Formerly Twitter): Singup Page HTML Injection Vulnerability

2014-10-1516:33:09
ashwarya
hackerone.com
18

Information
There’s an HTML Injection Vulnerability exists in Twitter main signup page which can be used by attackers to display personally crafted messages to twitter users for different malicious purposes. Affected parameters invite_code= & invite_name=.

Steps to reproduce:

  1. Refer to the main singup page.
  2. add invite_code= parameter along with any random value. I have used [] in my below POC.
  3. Now, put your personally crafted messages under invite_name= parameter. A user may even be prompted to visit a malicious link. Refer the final POC link. (Please Note: The reported vulnerability successfully works only when both parameters are used in conjunction with each other.)

Screenshot
Attached to this report

Final POC
[Refer this link](https://twitter.com/signup?invite_name=, it’s official. Twitter will start charging USD 4 per month from January 2015. However if you donate a one time amount of USD 10 to Twitter then your account will be considered as verified and twitter will be free for you. You can donate the amount directly to Twitter paypal address ([email protected]). However if you wish to proceed without making donation then a monthly amount of USD 4 will be charged to your account beginning January 2015. [Read More: http://t.co/rdj3TZV])

Let me know if i missed anything or any further information is required.