acunetix

1 article
sort: new top best
clear filter
0 7/10

A DOM-based XSS vulnerability was discovered in Google's /ajax/pi/fbfr endpoint where the location hash was directly used as a form action without validation, allowing javascript: protocol execution. The vulnerability was fixed by adding a check to ensure the hash begins with 'http' before using it as the form action.

Google Acunetix Andrey Leonov Link google.ws google.com
acunetix.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details