官术网_书友最值得收藏!

Attack Scenario

Coming up with a good attack scenario isn't as necessary as the previous data points, but can be a great method for increasing the bug's severity and boosting your payout.

For this attack, we'll highlight the extent of the damage beyond just the Gruyere app. If an attacker could execute arbitrary JavaScript from a stored XSS bug, they could exfiltrate sensitive cookies, such as those for authenticating financial apps (banks, brokers, and crypto traders) or social networks (Twitter, Facebook, Instagram), which could in turn be used for identity theft, credit card fraud, and other cyber crimes.

Here's how our report will look:

CATEGORY: Persistent / Stored XSS

TIME: 1:12 AM (1:12) UTC

URL: https://google-gruyere.appspot.com/09809809887686765654654/newsnippet.gtl

PAYLOAD: <a onmouseover="alert(document.cookie)">xxs link</a>

METHODOLOGY: XSS payload submitted manually

INSTRUCTIONS TO REPRODUCE:

1. Navigate to "New Snippet" submission page
2. Enter the XSS payload into the "New Snippet" form.
3. Click "Submit" and create a new snippet.
4. The malicious XSS contained in the payload is executed whenever someone hovers over the snippet with that link.

ATTACK SCENARIO:
With a persistent XSS vulnerability to exploit, a malicious actor could exfiltrate sensitive cookies to steal the identity of Gruyere's users, impersonating them both in the app and in whatever other accounts they are logged into at the time of the XSS script's execution.

主站蜘蛛池模板: 抚州市| 鄂托克旗| 邢台县| 玉环县| 长顺县| 青岛市| 裕民县| 敦煌市| 巴青县| 三门峡市| 和政县| 隆安县| 遵义市| 延安市| 离岛区| 远安县| 张家港市| 东乌珠穆沁旗| 喀喇沁旗| 滕州市| 金湖县| 嘉义市| 古蔺县| 梅河口市| 桂平市| 汝州市| 白城市| 志丹县| 江阴市| 台南县| 鄂尔多斯市| 涞水县| 府谷县| 水富县| 钟山县| 信宜市| 德阳市| 尖扎县| 民权县| 闸北区| 海丰县|