Dear Anass,
Thank you for reporting the HTML injection vulnerability on
https://data.4tu.nl.
I can confirm to have reproduced it. Due to the Content-Security-Policy, it doesn't render the CSS, so what's left is just the anchor tag.
I attached a patch to resolve the problem, for which I'd like to invite you to be the (co-)author of.
This patch has been applied to our testing environment, so you can test it out further:
If you would like to be (co-)author, then please let me know whether the "From" line (name and e-mail address) is correct.
Thank you again for your efforts and reporting!
Kind regards,
Roel Janssen
Hello,
My name is Anass, and I am a security researcher.I have discovered an
HTML injection vulnerability on the following page:
Vulnerable URL:
https://data.4tu.nl/search?institutions=28589&datatypes=%22%3E%3Ca%20style=%22position:absolute;margin:50px;%20background-color:%20yellow;%20z-index:1000;top:50px;padding:100px;font-weight:bold;font-size:45px;color:red;%22%20href=%22https://evil.com%22%3EClick%20here%20for%20win%201000%E2%82%AC!%3C/a%3E
This injection allows an attacker to insert arbitrary HTML elements into the page, which could be used for phishing or to trick users into clicking malicious links.
Impact:
An attacker could display fake messages or UI elements, potentially leading to user deception or redirection to malicious websites.
Please let me know if you need further details or a proof-of-concept demo.
Best regards,
Anass K.
Security Researcher