As much as this aspect, we’re able to launch the OkCupid application that is mobile a deep website link, containing a harmful JavaScript rule within the area parameter. The after screenshot shows the last XSS payload which loads jQuery and then lots JavaScript rule through the attacker’s host: (take note the top of area provides the XSS payload together with base section is similar payload encoded with URL encoding):
The screenshot that is following an HTTP GET demand containing the last XSS payload (part parameter):
The host replicates the payload delivered previous into the part parameter together with injected JavaScript code is performed when you look at the context of this WebView.
A script file from the attacker’s server as mentioned before, the final XSS payload loads. Continue reading “Fragile Data visibility & Performing actions with respect to the target”