chain-vulnerability

2 articles
sort: new top best
clear filter
0 8/10

A researcher discovered a chained CSRF vulnerability chain (4 requests) in a user management system's CSV import functionality that allowed unauthenticated account takeover by uploading a malicious CSV file without CSRF tokens, escalating to system admin privileges. The attack exploited timing delays between import steps and lack of CSRF protection on all four endpoints (file upload, job view, verification, and submission).

HackerOne A Bug'z Life
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 7/10

A researcher chained an AngularJS template injection self-XSS vulnerability with a misconfigured OAuth implementation that failed to validate the presence of the state parameter, allowing them to connect an attacker's Dropbox account to victim accounts and import malicious files containing XSS payloads, resulting in stored XSS execution.

Rohan Aggarwal HackerOne Dropbox Google Drive
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details