HackerOne
hackerone.com โบ reports โบ 1200770
Report #1200770 - XSS trigger via HTML Iframe injection ...
Hi team, I found an Iframe injection issue where I chained it and formed an XSS. I found the issue in the text editor area while โโโโโโโing the account. There is a place in the registration area where we have to give a reason for โโโโโโโโโ. We can write our reason and edit to show more beautifully.
HackerOne
hackerone.com โบ reports โบ 331110
Node.js third-party modules disclosed on HackerOne: [buttle] HTML...
March 29, 2018 - I would like to report HTML Injection in buttle module. Due to lack of filenames sanitization, it is possible to inject malicious ```iframe``` tag via filename and execute arbitray JavaScript code. # Module **module name:** buttle **version:** 0.2.0 **npm page:** https://www.npmjs.com/package/buttle ## Module Description Simple static file (+ markdown) server.
HackerOne
hackerone.com โบ reports โบ 309394
Node.js third-party modules disclosed on HackerOne: [anywhere] An...
January 25, 2018 - Hi Guys, **anywhere** allows to embed HTML in file names, which (in certain conditions) might lead to execute malicious JavaScript. **Module:** Running static file server anywhere. https://www.npmjs.com/package/anywhere **Description** To embed ...
Medium
jmrcsnchz.medium.com โบ playing-with-iframes-bypassing-content-security-policy-987c2f0b8e8a
Playing With iframes: Bypassing Content-Security-Policy | by 0xEchidonut | Medium
July 30, 2021 - company.com -> parent window hackerone-jm.firebaseapp.com -> child (iframe) Well, iframes are naughty children, they can mess with their parents most of the time if not given proper counter-measures. I watch anime in pirated streaming sites, and one thing all of us will remember are those annoying pop-ups and redirects. This is what inspired my findings ยท From a simple iframe injection, I upgraded mine to an open redirect.
HackerOne
hackerone.com โบ reports โบ 640530
curl disclosed on HackerOne: Insecure Frame (External)
## Summary: [Insecure Frame (External)] ## Steps To Reproduce: [Vulnerability Details identified an external insecure or misconfigured iframe.] Remedy Apply sandboxing in inline frame For untrusted content, avoid the usage of seamless attribute and allow-top-navigation, allow-popups and allow-scripts in sandbox attribute.
YouTube
youtube.com โบ watch
Bug Bounty Hunting - iframe Injection & HTML Injection - YouTube
Hey guys! welcome to the Bug Bounty Hunting series where we will be learning everything we need to know so that you can begin your journey in Bug Bounty Hunt...
Published ย May 3, 2019
HackerOne
hackerone.com โบ echidonut โบ hacktivity
HackerOne
It looks like your JavaScript is disabled. To use HackerOne, enable JavaScript in your browser and refresh this page
HackerOne
hackerone.com โบ reports โบ 319794
Node.js third-party modules disclosed on HackerOne: [m-server] HTML...
However, no escape is implemented which allows malicious user to embed executable JavaScript or HTML code (eg. to load HTML document into ```iframe``` element and execute JavaScript from within loaded file).