官术网_书友最值得收藏!

Attack Scenario

Coming up with a good attack scenario isn't as necessary as the previous data points, but can be a great method for increasing the bug's severity and boosting your payout.

For this attack, we'll highlight the extent of the damage beyond just the Gruyere app. If an attacker could execute arbitrary JavaScript from a stored XSS bug, they could exfiltrate sensitive cookies, such as those for authenticating financial apps (banks, brokers, and crypto traders) or social networks (Twitter, Facebook, Instagram), which could in turn be used for identity theft, credit card fraud, and other cyber crimes.

Here's how our report will look:

CATEGORY: Persistent / Stored XSS

TIME: 1:12 AM (1:12) UTC

URL: https://google-gruyere.appspot.com/09809809887686765654654/newsnippet.gtl

PAYLOAD: <a onmouseover="alert(document.cookie)">xxs link</a>

METHODOLOGY: XSS payload submitted manually

INSTRUCTIONS TO REPRODUCE:

1. Navigate to "New Snippet" submission page
2. Enter the XSS payload into the "New Snippet" form.
3. Click "Submit" and create a new snippet.
4. The malicious XSS contained in the payload is executed whenever someone hovers over the snippet with that link.

ATTACK SCENARIO:
With a persistent XSS vulnerability to exploit, a malicious actor could exfiltrate sensitive cookies to steal the identity of Gruyere's users, impersonating them both in the app and in whatever other accounts they are logged into at the time of the XSS script's execution.

主站蜘蛛池模板: 漯河市| 大竹县| 云和县| 荆门市| 莱西市| 河北区| 濮阳县| 临城县| 永川市| 辽宁省| 遵义县| 甘南县| 彰化县| 手机| 重庆市| 河间市| 永新县| 博白县| 鲁甸县| 盘锦市| 云和县| 乐平市| 中山市| 浪卡子县| 达拉特旗| 长宁区| 项城市| 明水县| 潼关县| 新和县| 松桃| 米脂县| 方城县| 通辽市| 定日县| 自治县| 漳浦县| 西丰县| 白水县| 汝阳县| 潞城市|