url-fragment

1 article
sort: new top best
clear filter
0 5/10

A bug bounty hunter discovered a DOM-based XSS vulnerability by using Google dorking to find interesting endpoints, then identifying that user input after the URL fragment (#) was being reflected into an IFRAME tag without proper sanitization, allowing injection of JavaScript payloads.

Abdelfattah Ibrahim
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details