session-hijacking

2 articles
Sort: New Top Best
clear filter
0 5/10

A researcher discovered a reflected XSS vulnerability in a language parameter that was cached by the web server, escalating it to account takeover by leveraging web cache poisoning to persist the malicious payload across all users visiting the site, exploiting missing HttpOnly/Secure cookie flags and lack of CSP.

lutfumertceylan.com.tr · kh4sh3i/bug-bounty-writeups · 4 hours ago · details
0

Step-by-step exploitation of multiple SQL injection vulnerabilities in Oculus' website, demonstrating blind SQL injection techniques with whitespace and comma filtering bypass to extract admin session credentials. The attacker chained five SQL injections together, using creative MySQL syntax (comment blocks, OFFSET instead of comma-based LIMIT) to gain administrator access without prepared statements.

Oculus Facebook Josip Franjković Jon Bitquark developer.oculusvr.com CompanyAction.php Burp sqlmap
josipfranjkovic.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details