Vulnerability - HTML Email Injection
-----------------------------------------------------------------------------------
-----------------------------------------------------------
Description - HTML injection is a vulnerability in which attacker-provided input is
rendered as HTML. HTML injection in emails can lead to attackers phishing users
from a legitimate email address.
-----------------------------------------------------------------------------------
-----------------------------------------------------------
Steps-
1 - Go to the URL https://abc.com
2 - Create an account with html payload in first name and last name
Payload- <img src="http://evanricafort.com/profile.png">
<img src="https://bit.ly/3tpPNzv">
3 - Generate a reset password/verification email
4 - The image will be executed in the verification/reset password email sent by the
company.
-----------------------------------------------------------------------------------
-----------------------------------------------------------
Impact - This vulnerability can lead to the reformatting/editing of emails from an
official email address, which can be used in targeted phishing attacks. This could
lead to users being tricked into giving logins away to malicious attackers.
-----------------------------------------------------------------------------------
-----------------------------------------------------------
FOR YOUR REFERENCE - It can be tried on registration / invite user / contact us -
support - feedback or any page through which company sends an email to the victim.
-----------------------------------------------------------------------------------
-----------------------------------------------------------