practo

1 article
sort: new top best
clear filter
0 5/10

A researcher bypassed Practo's XSS firewall by discovering that the 'oncopy' event handler was not blocked, allowing HTML injection and XSS via the payload <vipin oncopy=prompt(document.domain)>. The vulnerability was reported and fixed quickly.

Practo Vipin Chaudhary brutelogic
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details