cookie-stealing

2 articles
sort: new top best
clear filter
0 6/10

A researcher discovered a URI-based XSS vulnerability in a redirect parameter (example.com/social?redirect=) using Google dorking to find hidden endpoints, exploiting javascript:// protocol handling to execute arbitrary JavaScript when users logged in after being redirected to a malicious URL.

Jatin Nandwana HackerOne Google Hacking Database Exploit-DB
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 6/10
bug-bounty

A security researcher discovered a stored XSS vulnerability in an online store's address field, bypassing a 20-character input length restriction using a short Punycode domain (<script src=//ł.rip>) and crafting a custom cookie-stealing payload. Although the XSS was confirmed to work, the vendor rejected it as 'self-XSS' and marked it as won't fix.

Smaran Chand Dr. Mario Coded Brain Santosh Threatcon 2019 ł.rip
smaranchand.com.np · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details