client-side-attack

5 articles
sort: new top best
clear filter
0 5/10

A 2FA bypass vulnerability was discovered on Pandao.ru (Mail.ru's extended program) where CSRF tokens used to disable 2FA never expire, allowing an attacker to reuse the same token to disable 2FA on victim accounts. The vulnerability was reported but no bounty was awarded as the program excludes client-side attacks.

Mail.ru Pandao.ru HackerOne BurpSuite Vishal Bharad
vbharad.medium.com · kh4sh3i/bug-bounty-writeups · 20 hours ago · details
0 7/10

A researcher demonstrates a full account takeover vulnerability combining misconfigured CORS with socket-based connections. By exploiting CORS headers that allow credentials and replicating a chain of five interdependent socket requests through JavaScript, an attacker can extract sensitive session tokens from victims and hijack their accounts.

HackerOne Meteor Samuel XMLHttpRequest
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 5/10

A CSRF vulnerability on Mail.ru's Pandao.ru subdomain allowed disabling 2FA on victim accounts by reusing a non-expiring CSRF token, demonstrating a client-side authentication bypass technique via malicious HTML file delivery.

Mail.ru Pandao.ru HackerOne Vishal Bharad BurpSuite
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 6/10

A writeup demonstrating how chaining self-XSS with clickjacking (UI redressing) via missing X-Frame-Options header can achieve session hijacking by stealing victim cookies through a drag-and-drop PoC that executes malicious JavaScript on the victim's browser.

Armaan Pathan InfoSec Write-ups HackerOne Bugcrowd Rahul Maini
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 5/10

A researcher discovered a reflected XSS vulnerability on a login page's redirect parameter that allowed stealing user credentials by injecting JavaScript code to exfiltrate email and password values, resulting in a $100 bounty.

mehulpanchal007 HackerOne
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details