How I found DOM XSS via postMessage on bing.com and received a reward by Microsoft Bug Bounty namcoder.com/blog/how-i-fou… #microsoft #bugbounty #bugbountytips
1
3
11
6
851
like in which position u are trying to trigger it with postMessage('message', '*'), how do u debug it then exploit it? like how u check do if the code is vulnerable, it's a bit hard for me to understand, like i found one there wasn't dangerous source and any origin and didn't pop
1
0
0
0
45
Yes. Put the breakpoint inside the listener on the “Sources” tab. Then send the test postMessage({},’*’) on the “Console” tab. You should have some knowledge about the JavaScript to debug. When you send the postmessage, it will trigger the breakpoint
0
0
2
0
32
United States Trends
- 1. Austin Reaves 48.2K posts
- 2. #LakeShow 3,063 posts
- 3. Trey Yesavage 37.3K posts
- 4. Jake LaRavia 5,723 posts
- 5. #LoveIsBlindS9 4,007 posts
- 6. jungwoo 104K posts
- 7. doyoung 79.5K posts
- 8. Rudy 9,242 posts
- 9. Blue Jays 62K posts
- 10. #Lakers 1,128 posts
- 11. Jeremy Lin N/A
- 12. #AEWDynamite 22.9K posts
- 13. Happy Birthday Kat N/A
- 14. Pelicans 4,413 posts
- 15. Snell 13.6K posts
- 16. Devin Booker 1,237 posts
- 17. #WorldSeries 66.8K posts
- 18. Kacie 1,830 posts
- 19. Wolves 64.2K posts
- 20. CALL 12 3,301 posts
Loading...
Something went wrong.
Something went wrong.