client-side-injection

2 articles
sort: new top best
clear filter
0 6/10
bug-bounty

A DOM XSS vulnerability exploiting unsafe use of location.pathname in AJAX requests, where an attacker can inject a protocol-relative URL (//attacker.com) to redirect the AJAX call to a malicious domain and inject arbitrary JavaScript into the page.

DOM XSS AJAX location.pathname
jinone.github.io · devanshbatham/Awesome-Bugbounty-Writeups · 12 hours ago · details
0 7/10

Demonstrates how missing Origin header validation on WebSocket endpoints can allow cross-origin XSS and CSRF attacks. The attacker connects to an unprotected WebSocket, sends malicious payloads containing script tags that get rendered in the receiving client's DOM, achieving application-wide XSS and account takeover capabilities.

Osama Avvan BurpSuite websocket.org
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 12 hours ago · details