javascript-exploitation

3 articles
sort: new top best
clear filter
0 6/10

A researcher exploited CORS misconfiguration on a Netgear API endpoint that accepted subdomain origins in combination with reflected XSS on a subdomain to exfiltrate sensitive user data (email, age, gender, DOB) via XMLHttpRequest with credentials.

Netgear Bugcrowd James Kettle Daniel Bakker Kaushal Parikh Noman Shaikh
bugbaba.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 8/10

Researcher demonstrates escalation of a subdomain takeover on impact.postmates.com (GitHub pages vulnerability) into session cookie theft by leveraging document.domain relaxation in the parent domain postmates.com, enabling account takeover despite the subdomain being out-of-scope. The technique exploits the fact that if the main domain explicitly sets document.domain, a compromised subdomain can set it to match and access sensitive cookies via JavaScript.

Postmates HackerOne Synack impact.postmates.com raster-static.postmates.com GitHub
blog.takemyhand.xyz · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 3/10

Demonstrates stealing authentication tokens stored in browser local storage via stored XSS on an admin account, using an img onerror payload to exfiltrate data to an attacker server. The researcher found this vulnerability on a Bugcrowd private program and was awarded $800.

bugcrowd OLX localStorage.getItem()
blog.h4rsh4d.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details