Just like any other search engine, this site simply searches based on keywords and when I searched for "Sales Executive" ( I am not a sales executive though

What is interesting here is what happens when I search for a string like "<style>body {background: red;}</style>Gotcha! Now this is how you do client side code injection!!" the results page changes like this. Or when I search for something like "<script>var x=document.cookie;alert("Arun Ragh now have access to your Joberix cookies - " + x);</script>" it take me to a very vulnerable page like this. I can basically read all your Joberix related cookies which I can always use it to fake requests from your joberix account.
It is a simple but a very critical client-side code injection mechanism in websites to get access to your password protected data, but I am still wondering why Joberix.com is not bothered to fix this issue.

As I published this post I realized that blogspot.com also has this vulnerability.

1 comment:
I dont think its is a bug with http://blogspot.com. Its an intended feature.
Post a Comment