Back to Labs
Real World Bug HackerOne #1818163 — Equifax — Reflected XSS in JS Context — Medium (5.6)

How can we help you?

Search our Help Center for answers to common questions

Search Results for "credit freeze"

5 results found
How to freeze your credit report
equifax.com/personal/credit-report-services/credit-freeze/
Learn how to place a security freeze on your Equifax credit report to help protect against unauthorized access.
Understanding your credit score
equifax.com/personal/education/credit/score/
Your credit score is a three-digit number that lenders use to evaluate your creditworthiness. Here's how it works.
Disputing information on your credit report
equifax.com/personal/credit-report-services/dispute-credit/
If you believe there is inaccurate information on your credit report, you have the right to dispute it.
Equifax Data Breach Settlement — FAQs
equifax.com/personal/education/credit/report/data-breach-settlement/
Find answers to frequently asked questions about the Equifax data breach settlement and your eligibility.
How to get a free copy of your credit report
equifax.com/personal/credit-report-services/free-credit-reports/
You are entitled to a free credit report from each of the three major credit bureaus every 12 months.

Real World Lab — What to Find

This page simulates the Equifax Help Center search endpoint vulnerable to reflected XSS. The ?search= parameter appears to be correctly handled in the HTML output — but look deeper. View the page source and search for your input. You will find it reflected a second time, inside a <script> block within a JavaScript analytics call.

Your goal: trigger alert() without using any HTML tags. You need to escape a JavaScript string, not HTML.

Platform: HackerOne
Report: #1818163
Target: Equifax (equifax.com)
Severity: Medium (5.6)
Researcher: abdoubouanik
Status: Resolved (2023)