Art of bug bounty: a way from JS file analysis to XSS
0 net
Securitum. Leading european penetration testing company This website uses cookies To provide the highest level of service we use cookies on this site. Your continued use of the site means that you agree to their use in accordance with our terms and conditions . CLOSE Insights Art of bug bounty: a way from JS file analysis to XSS Jakub Å»oczek July 1, 2020 Summary: During my research on other bug bounty program I've found Cross-Site Scripting vulnerability in cmp3p.js file, which allows attacker to execute arbitrary javascript code in context of domain that include mentioned script. Below you can find the way of finding bug bounty vulnerabilities from the beginning to the end, which includes: > In depth analysis of vulnerability, > Proof of Concept for consent.cmp.oath.com domain, > Proof of Concept for tumblr.com. To describe the impact of this research, it is worth to mention that described research should also works for any other host that includes cmp3p.js file. Browserâs Cross-Origin Communication: To better understand this vulnerability itâs worth mentioning some mechanism that browsers implement to communicate between origins. One of them is postMessage . If site A have an