httponly-bypass

1 article
sort: new top best
clear filter
0 7/10
vulnerability

A researcher exploited a reflected XSS vulnerability combined with CSRF to steal httpOnly session cookies by leveraging the server's practice of returning session tokens in response bodies. The attack uses String.fromCharCode concatenation to bypass character filtering and executes XMLHttpRequest to extract the session cookie from login endpoint responses.

Yasser Gersy jerico.com String.fromCharCode XMLHttpRequest
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details