Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Hacking Github with Webkit

$
0
0
Previously on Github: XSSCSRF (My github followers are real, I gained followers using CSRF on bitbucket), access bypass, mass assignments (2 Issues Reported forever), JSONP leaking, open redirect.....

TL;DR: Github is vulnerable to cookie tossing. We can fixate _csrf_token value using a Webkit bug and then execute any authorized requests.

Github Pages

Plain HTML pages can served from yourhandle.github.com. These HTML pages may contain Javascript code.
Wait.
Custom JS on your subdomains is a bad idea:
  1. If you have document.domain='site.com' anywhere on the main domain, for example xd_receiver, then you can be easily XSSed from a subdomain
  2. Surprise, Javascript code can set cookies for the whole *.site.com zone, including the main website.

read more........http://homakov.blogspot.ru/2013/03/hacking-github-with-webkit.html

Viewing all articles
Browse latest Browse all 8064

Trending Articles