bug-bounty498
google352
xss301
microsoft295
facebook262
rce211
exploit199
malware171
apple163
cve136
account-takeover115
bragging-post102
privilege-escalation95
csrf90
phishing86
browser75
writeup74
authentication-bypass69
supply-chain67
dos66
stored-xss65
reflected-xss57
ssrf56
reverse-engineering55
react52
access-control52
input-validation49
cross-site-scripting48
aws47
cloudflare47
docker46
web-security46
lfi46
sql-injection45
smart-contract45
web-application44
ethereum44
web343
ctf43
oauth43
node43
defi43
pentest40
race-condition39
open-source38
cloud37
idor37
info-disclosure36
burp-suite36
vulnerability-disclosure35
0
8/10
vulnerability
Technical writeup demonstrating how arbitrary XSS vulnerabilities in Outlook and Twitter were exploited by chaining cookie injection attacks with browser-specific parsing differences. The researchers discovered endpoints that reflected user input into Set-Cookie headers, then leveraged Safari's comma-delimited cookie parsing to inject malicious ClientId/session cookies that would execute stored XSS payloads on victim browsers.
xss
cross-site-scripting
cookie-injection
crlf-injection
flash-messages
safari-bypass
set-cookie-header
bug-bounty
outlook
twitter
vulnerability-chaining
csp-bypass
Outlook
Twitter
Safari
Chrome
Firefox
RFC 2109
Ruby on Rails
Microsoft
ActionDispatch::Flash