官术网_书友最值得收藏!

Attack Scenario

Coming up with a good attack scenario isn't as necessary as the previous data points, but can be a great method for increasing the bug's severity and boosting your payout.

For this attack, we'll highlight the extent of the damage beyond just the Gruyere app. If an attacker could execute arbitrary JavaScript from a stored XSS bug, they could exfiltrate sensitive cookies, such as those for authenticating financial apps (banks, brokers, and crypto traders) or social networks (Twitter, Facebook, Instagram), which could in turn be used for identity theft, credit card fraud, and other cyber crimes.

Here's how our report will look:

CATEGORY: Persistent / Stored XSS

TIME: 1:12 AM (1:12) UTC

URL: https://google-gruyere.appspot.com/09809809887686765654654/newsnippet.gtl

PAYLOAD: <a onmouseover="alert(document.cookie)">xxs link</a>

METHODOLOGY: XSS payload submitted manually

INSTRUCTIONS TO REPRODUCE:

1. Navigate to "New Snippet" submission page
2. Enter the XSS payload into the "New Snippet" form.
3. Click "Submit" and create a new snippet.
4. The malicious XSS contained in the payload is executed whenever someone hovers over the snippet with that link.

ATTACK SCENARIO:
With a persistent XSS vulnerability to exploit, a malicious actor could exfiltrate sensitive cookies to steal the identity of Gruyere's users, impersonating them both in the app and in whatever other accounts they are logged into at the time of the XSS script's execution.

主站蜘蛛池模板: 宜章县| 克山县| 灌阳县| 灯塔市| 宁城县| 兴海县| 承德市| 杭锦旗| 黄龙县| 仁寿县| 虞城县| 宜昌市| 华阴市| 札达县| 商城县| 尤溪县| 黎城县| 大余县| 吴旗县| 黄龙县| 昆山市| 纳雍县| 钟祥市| 南木林县| 鹤壁市| 东城区| 玉环县| 林周县| 专栏| 汤阴县| 丰顺县| 隆子县| 江西省| 宜良县| 昭苏县| 治县。| 定安县| 南汇区| 丰都县| 山西省| 镇江市|