Bypass to postMessage origin validation via FTP
High
S
Slack
Submitted None
Team Summary
Official summary from Slack
@a1kmm- discovered a bypass to our postMessage origin check, wherein an attacker with existing MITM capabilities could use FTP to bypass validation and view XOXS tokens of victims on the local network. This was related to, and investigated at the same time as, a previous report. This issue is now resolved and was not exploited. Thanks @a1kmm-!
Actions:
Reported by
a1kmm-
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Generic