#XSS

2026-02-10
2026-02-04

SQL for Bug Bounty Hunters 3.0
This vulnerability revolved around a stored XSS (Cross-Site Scripting) attack in an application form, leveraging JavaScript and cookies to bypass Content Security Policy (CSP). The form accepted user input without proper sanitization, allowing the injection of malicious scripts within a <script> tag. By exploiting this flawed validation mechanism, the researcher injected a payload containing SQL commands that were executed due to the lack of CSP protection against inline scripts. This led to SQL Injection (SQLi) and subsequent unauthorized access to sensitive data stored in the database. The article provides techniques for exploitation, including encoding SQLi payloads within JavaScript to bypass input validation. The researcher was awarded a substantial bounty, highlighting the importance of proper CSP implementation and input sanitization. To mitigate such attacks, developers should implement Content Security Policy controls effectively, avoiding inline scripts and whitelisting allowed sources. Key lesson: Input validation and CSP controls are crucial for preventing Cross-Site Scripting and SQL Injection attacks. #BugBounty #Cybersecurity #XSS #SQLInjection #WebSecurity

meetcyber.net/sql-for-bug-boun

2026-02-04

#56 rank on PortSwigger Labs
This article showcases an Authentication Bypass vulnerability through a combination of Cross-Site Scripting (XSS) and Session ID manipulation. The application failed to properly sanitize input, allowing an attacker to inject JavaScript into a login page's form field using XSS. By setting the value of a hidden session token field to an arbitrary session ID, the researcher exploited a flawed authentication mechanism that relied on user-controlled session tokens without validating their origin. This resulted in unauthorized access and privilege escalation. The researcher was ranked 56th on PortSwigger Labs for this find. Fixing the issue requires proper input validation, using secure cookies, and token-based authentication. Key lesson: Never trust user-controlled data for security decisions—validate and sanitize all inputs. #BugBounty #Cybersecurity #WebSecurity #XSS #AuthenticationBypass

medium.com/@rahultandale024/56

2026-02-02

Gitlab, A Foxy Recipe For Success — An XXE & A Mouth-Watering $66,000 Bounty
This vulnerability was a combination of XML External Entity (XXE) Injection and Cross-Site Scripting (XSS). The application used an external library without proper input validation, allowing the researcher to inject malicious XML payloads. By exploiting this XXE, they could read arbitrary files from the server's file system, including sensitive configuration files containing internal API keys. Additionally, the XXE triggered an XSS vulnerability when outputting the parsed XML content, enabling attackers to execute arbitrary JavaScript in the victim's browser. The researcher received a $66,000 bounty for discovering this critical flaw. To mitigate such attacks, ensure proper input validation of external libraries and restrict access to sensitive files through the use of least privilege principles. Key lesson: Validate inputs at multiple layers, and don't trust third-party libraries blindly. #BugBounty #Cybersecurity #WebSecurity #XXE #XSS

medium.com/@justas_b_2/gitlab-

2026-01-30

Exploiting DOM Clobbering to Enable DOM-Based XSS
This article discusses a DOM-based Cross-Site Scripting (XSS) vulnerability, exploited through manipulation of JavaScript variables. The root cause was the application's failure to sanitize user inputs when setting object properties, leading to data injection into sensitive contexts. By using DOM clobbering (overwriting existing JavaScript variables with malicious payloads), the researcher was able to insert arbitrary scripts within the vulnerable domain's context. This attack vector allowed for injecting and executing XSS payloads without relying on reflected or stored attacks. The technical details demonstrate that sensitive information could be leaked or modified by an attacker through this flaw, leading to privacy breaches and potential account takeovers. The researcher reported the vulnerability, received a bounty reward, and encouraged developers to sanitize user inputs when setting object properties and apply Content Security Policy (CSP) with appropriate directives. Key lesson: Always validate user inputs and be mindful of JavaScript variable assignments to prevent DOM-based XSS attacks. #BugBounty #WebSecurity #XSS #InputValidation #DOM

osintteam.blog/exploiting-dom-

2026-01-29

🎯 Make XSS hunting easier and faster

In the latest video in our Eval Villain series, @bemodtwz demonstrates how the “needles” feature can dramatically speed up your search for DOM-based XSS and other injection points.

If you’re doing client-side security testing, this is a great example of how the right tooling can remove friction and help you focus on what matters: finding real vulnerabilities.

👉 Watch here: youtu.be/LI9QOuQDduE

#AppSec #Doyensec #BugBounty #security #XSS

2026-01-26

Badacze zhakowali panel administracyjny infostealera StealC. Wszystko przez XSS i błędy w konfiguracji

Malware StealC jest dobrze znany zarówno w środowisku cyberprzestępców jak i badaczy bezpieczeństwa. Popularność zyskał przede wszystkim za sprawą niskiego progu wejścia dla atakujących oraz wysoką skutecznością działania. Jest oferowany w modelu Malware-as-a-Service (MaaS). Charakteryzuje się masowym wykradaniem ciasteczek sesyjnych (pliki cookie), kradzieżą danych z portfeli kryptowalutowych oraz wsparciem dla...

#WBiegu #Clickfix #Infostealer #Malware #Stealc #XSS #Youtube

sekurak.pl/badacze-zhakowali-p

AllAboutSecurityallaboutsecurity
2026-01-20

Wenn Angreifer selbst zum Ziel werden: Wie Forscher eine Infostealer-Infrastruktur kompromittierten

Durch eine einfache XSS-Lücke im Administrationspanel der Infostealer-Malware gelang es Forschern, die Betreiber selbst auszuspionieren und deren Cookies zu entwenden – exakt jene Daten, auf die es die Kriminellen bei ihren Opfern abgesehen haben.

all-about-security.de/wenn-ang

2026-01-17

Researchers have disclosed XSS vulnerabilities in Meta’s Conversions API Gateway, a server-side analytics framework deployed across Meta-owned domains and numerous third-party environments.

The findings demonstrate how:
- Improper origin validation can undermine trust boundaries
- Unsafe code generation practices amplify supply-chain risk
- Shared JavaScript execution environments magnify impact

This case reinforces that analytics infrastructure should not be categorized as low-risk, particularly when it operates across multiple domains and authenticated sessions.

Source: gbhackers.com/critical-xss-vul

How do you incorporate analytics and tracking systems into your threat models?

Engage with the discussion and follow TechNadu for measured, technical cybersecurity coverage.

#InfoSec #ApplicationSecurity #XSS #SupplyChainRisk #WebSecurity #TechNadu

Critical XSS Vulnerabilities in Meta Conversion API Enable Zero-Click Account Takeover
2026-01-16

iX-Workshop: OWASP Top 10 – Sicherheitsrisiken für Webanwendungen verstehen

Lernen Sie die wichtigsten Sicherheitslücken in Web-Anwendungen kennen und erfahren Sie, wie Sie sich erfolgreich schützen können.

heise.de/news/iX-Workshop-OWAS

#XSS #CSRF #IT #iXWorkshops #OWASP #news

2026-01-15

RE: infosec.exchange/@doyensec/115

📢 Just published - the third video in our series on Eval Villain. Our @bemodtwz walks through using it to find 🔎 a DOM XSS to demonstrate its functionality. Check it out today!

youtu.be/Hp7TexA6vFg

#appsec #doyensec #security #evalvillain #xss

2026-01-12

This is a first for me: received a phishing mail with a link to an innocent website with an XSS vulnerability which is being abused by the link to redirect to a malicious phishing site.

#phishing #XSS

CodeFreezR (he/him)CodeFreezR@chaos.social
2026-01-02

r6d4: Heute habe ich mir mal die Möglichkeiten angeschaut Mastodon-Post #XSS sauber in die #jek25 Seite einzubinden. Dazu habe ich einen kleinen spike gebastelt.

y.lab.nrw/jek25-spike

\__
#100DaysofCode #wartenauf39c3 #crosssitescripting

2026-01-02

iX-Workshop: OWASP Top 10 – Sicherheitsrisiken für Webanwendungen verstehen

Lernen Sie die wichtigsten Sicherheitslücken in Web-Anwendungen kennen und erfahren Sie, wie Sie sich erfolgreich schützen können.

heise.de/news/iX-Workshop-OWAS

#XSS #CSRF #IT #iXWorkshops #OWASP #news

2025-12-28

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst