Click any tag below to further narrow down your results
Links
This article explains the design and functionality of the new Sanitizer API being integrated into browsers for HTML sanitization. It highlights how the API aims to prevent XSS vulnerabilities by eliminating the need for ambiguous parsing and ensuring context sensitivity during input processing.
GMSGadget is a collection of JavaScript tools designed to bypass XSS mitigations like Content Security Policy and HTML sanitizers. The tools listed are not exploits but rather patched vulnerabilities or JavaScript behaviors that can circumvent HTML restrictions. Contributions for new gadgets and documentation improvements are encouraged.
Daniel, a 16-year-old hacker, details how he and friends discovered critical vulnerabilities in Mintlify, an AI documentation platform. They found a cross-site scripting flaw that could have allowed attackers to compromise accounts across several major companies, including Discord. After reporting the issue, they received bounties for their findings.
XSSRecon automates the detection of reflected XSS vulnerabilities by testing URL parameters. It checks both raw HTTP responses and rendered DOM content, allowing security researchers to identify how special characters are handled in web applications. The tool supports concurrent processing and customizable output formats.
This article details multiple security vulnerabilities discovered in Mintlify's documentation platform, including remote code execution and cross-site scripting flaws. The author and collaborators successfully exploited these issues, leading to significant risks for Mintlify's clients, including major companies like Discord and Vercel. They also describe the swift response from Mintlify in patching these vulnerabilities.
This article examines a security flaw in the Facebook JavaScript SDK that can lead to account takeovers. It highlights the use of an insecure random number generator and a cross-site scripting vulnerability in the Customer Chat plugin, enabling attackers to exploit message validation mechanisms.
The resource compilation focuses on client-side security vulnerabilities, particularly in JavaScript, providing a wealth of guides, tips, and practical challenges for pentesters and bug bounty hunters. It covers topics ranging from XSS and PostMessage vulnerabilities to CSP bypass techniques and includes a variety of writeups and educational materials to enhance understanding and skills in this area.
The article discusses the persistence of Cross-Site Scripting (XSS) vulnerabilities in modern web frameworks, exploring the underlying reasons that contribute to this issue. It emphasizes the challenges developers face in mitigating XSS threats despite advancements in security practices and tools. Insights into the complexity of web application development and the balance between functionality and security are also provided.
peeko is a browser-based XSS-powered Command and Control tool that utilizes the victim's browser as a proxy to interact with internal networks. Through a WebSocket connection established by an injected XSS payload, attackers can remotely control browsers to execute commands, scan networks, and exfiltrate data without installing any binaries. The tool is designed for educational and authorized testing purposes only.
The article discusses the setHTML() method of the Element interface, which provides a way to safely parse and sanitize HTML strings before inserting them into the DOM. This method removes any XSS-unsafe elements and attributes, making it a recommended replacement for Element.innerHTML when handling untrusted content. It also highlights the importance of using a sanitizer configuration to define allowed elements and attributes.