302-redirect

1 article
sort: new top best
clear filter
0 5/10

A reflected XSS vulnerability on Twitter's dev.twitter.com was discovered by exploiting inconsistent URL parsing between Location headers and href attributes in 302 redirects, combined with port manipulation and clickjacking to trigger execution. The payload leveraged a trailing slash and special characters to bypass Twitter's XSS filters, earning a $1,120 bounty.

Twitter dev.twitter.com Bywalks bobrov
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details