event-handler

1 article
sort: new top best
clear filter
0 7/10
bug-bounty

A stored XSS vulnerability was discovered in a web application's 'Save for later' feature by bypassing WAF protections using Unicode-encoded HTML characters and event handlers. The attacker crafted a payload with Unicode escapes (e.g., \u003E for >, \u0045 in onmouseleave) to evade signature-based filtering and achieved POST-based XSS that was chainable with CSRF for authenticated users.

Prial Islam Khan
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details