javascript-context

1 article
sort: new top best
clear filter
0 6/10

A reflected XSS vulnerability was discovered in a private program where URL parameters prefixed with 'utm_' were reflected without encoding in a JavaScript context. The breakthrough came from fuzzing parameter names themselves rather than values—specifically injecting JavaScript payload directly into the parameter name (e.g., 'utm_foobarbaz\')<>') which bypassed encoding applied to parameter values.

Rahul Maini
noob.ninja · devanshbatham/Awesome-Bugbounty-Writeups · 11 hours ago · details