Loading HuntDB...

Bypass to postMessage origin validation via FTP

High
S
Slack
Submitted None

Team Summary

Official summary from Slack

@a1kmm- discovered a bypass to our postMessage origin check, wherein an attacker with existing MITM capabilities could use FTP to bypass validation and view XOXS tokens of victims on the local network. This was related to, and investigated at the same time as, a previous report. This issue is now resolved and was not exploited. Thanks @a1kmm-!

Reported by a1kmm-

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic