Difference between revisions of "Persistent XSS In Verizon"

From Fiamma
Jump to navigationJump to search
(Created page with "https://randywestergren.com/persistent-xss-verizons-webmail-client/ Persistent XSS In Verizon 6 7 {{#set: k=xss,infosec,case,js,vuln,|+sep=, }} Interesting scenario with gen...")
 
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 +
{{B|
 
https://randywestergren.com/persistent-xss-verizons-webmail-client/
 
https://randywestergren.com/persistent-xss-verizons-webmail-client/
Persistent XSS In Verizon
+
|Persistent XSS In Verizon
6
+
|6
7
+
|7
 
+
}}
 
{{#set:
 
{{#set:
 
k=xss,infosec,case,js,vuln,|+sep=,
 
k=xss,infosec,case,js,vuln,|+sep=,
Line 11: Line 12:
 
<footer onafterprint="console.log(244599)" onbeforeprint="console.log(309354)"[...] </nowiki>), onwheel/oninput resulting in xss and clickjacking.
 
<footer onafterprint="console.log(244599)" onbeforeprint="console.log(309354)"[...] </nowiki>), onwheel/oninput resulting in xss and clickjacking.
  
[[Category: Infosec]]
+
[[Category: Web security]]

Latest revision as of 06:46, 22 December 2016

https://randywestergren.com/persistent-xss-verizons-webmail-client/
Persistent XSS In Verizon

Complexity: 6 Rating: 7



Interesting scenario with generation of all possible HTMLs ( <footer onafterprint="console.log(244599)" onbeforeprint="console.log(309354)"[...] ), onwheel/oninput resulting in xss and clickjacking.