FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ /r/netsec - Information Security News & Discussion

Admin Emails & Passwords Exposed via HTTP Method Change

By: /u/General_Speaker9653 β€” July 26th 2025 at 01:32

Just published a new write-up where I walk through how a small HTTP method misconfiguration led to admin credentials being exposed.

It's a simple but impactful example of why misconfigurations matter.

πŸ“– Read it here: https://is4curity.medium.com/admin-emails-passwords-exposed-via-http-method-change-da23186f37d3

Let me know what you think β€” and feel free to share similar cases!

#bugbounty #infosec #pentest #writeup #websecurity

submitted by /u/General_Speaker9653
[link] [comments]
☐ β˜† βœ‡ /r/netsec - Information Security News & Discussion

From Blind XSS to RCE: When Headers Became My Terminal

By: /u/General_Speaker9653 β€” July 13th 2025 at 00:35

Hey folks,

Just published a write-up where I turned a blind XSS into Remote Code Execution , and the final step?

Injecting commands via Accept-Language header, parsed by a vulnerable PHP script.

No logs. No alert. Just clean shell access.

Would love to hear your thoughts or similar techniques you've seen!

πŸ§ πŸ›‘οΈ

https://is4curity.medium.com/from-blind-xss-to-rce-when-headers-became-my-terminal-d137d2c808a3

submitted by /u/General_Speaker9653
[link] [comments]
☐ β˜† βœ‡ /r/netsec - Information Security News & Discussion

Bypassing Live HTML Filtering to Trigger Stored XSS – DOM-Based Exploitation

By: /u/General_Speaker9653 β€” July 9th 2025 at 03:16

I recently tested a language-learning site that used live frontend filtering to block HTML input (e.g., <img> <svg> tags were removed as you typed).

But by injecting the payload directly via browser console (without typing it), the input was submitted and stored.

Surprisingly, the XSS executed later on my own profile page β€” indicating stored execution from a DOM-based bypass.

I wrote a short write-up here:

https://is4curity.medium.com/xss-before-submit-a-dom-based-execution-flaw-hidden-in-plain-sight-5633bdd686c9

enjoy

submitted by /u/General_Speaker9653
[link] [comments]
❌