credentials-exposure

2 articles
sort: new top best
clear filter
0 7/10

A researcher demonstrates a full account takeover vulnerability combining misconfigured CORS with socket-based connections. By exploiting CORS headers that allow credentials and replicating a chain of five interdependent socket requests through JavaScript, an attacker can extract sensitive session tokens from victims and hijack their accounts.

HackerOne Meteor Samuel XMLHttpRequest
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 7/10

A CORS misconfiguration vulnerability where the server's origin validation logic uses flawed regex/string matching that accepts malformed origin headers (e.g., 'private1com' instead of 'private.com'), allowing an attacker to register a lookalike domain and exfiltrate credentials and private information via a crafted CORS-enabled request.

Virus0X01 offensive hunterr
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details