arbitrary-file-disclosure

1 article
sort: new top best
clear filter
0 8/10

A researcher escalated XSS in a PhantomJS image rendering endpoint to arbitrary local file read by exploiting JavaScript execution in the file:// context, using document.write to force synchronization and XMLHttpRequest to exfiltrate files from the Lambda environment at /var/task/.

PhantomJS AWS Lambda Brett (researcher name - ziot)
buer.haus · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details