jquery-exploitation

2 articles
sort: new top best
clear filter
0 7/10

A persistent XSS vulnerability was discovered in AH.nl's avatar upload feature where user input was not properly sanitized, allowing attackers to inject malicious JavaScript that would execute for all site visitors viewing the attacker's profile. The exploit bypassed firewall filters using obfuscation techniques like 'onerroronerror==' and leveraged jQuery's getScript() to load external malicious code for cookie theft and phishing attacks.

AH.nl Albert Heijn Kookschrift Jonathan Bouman Burp Suite BeEF Project jQuery
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 6/10

Researcher bypassed a WAF filtering angle brackets by inserting dummy tags (e.g., <x>) to obfuscate XSS payloads, then exploited reflected XSS to steal user credit card data via jQuery GET/POST requests to exfiltrate payment details pages.

Osama Avvan Bugcrowd Redact.com
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details