shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

269
active users

#xss

0 posts0 participants0 posts today
Tanya Janca | SheHacksPurple :verified: :verified:<p>🎥 Missed one of my past conference talks? Let’s fix that.</p><p>I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.</p><p>“XSS Deep Dive”<br>📽️ <a href="https://twp.ai/4in9ro" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4in9ro</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/owasp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>owasp</span></a> <a href="https://infosec.exchange/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a></p>
acffh morst<p><span class="h-card" translate="no"><a href="https://toad.social/@grumpybozo" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>grumpybozo</span></a></span> might be less vulnerable to browser based attacks from other websites such as Cross-Site Scripting<br><a href="https://toad.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://owasp.org/www-community/attacks/xss/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.org/www-community/attack</span><span class="invisible">s/xss/</span></a></p>
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸<p>When you are handling user data do you sanitize it...</p><p>Update: To be clear, sending data to a database is considered "use"; it is a given that you sanitize data before putting it in SQL, or HTML</p><p>(Boost for increased sample size)</p><p><a href="https://mastodon.social/tags/webDev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webDev</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/javaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javaScript</span></a> <a href="https://mastodon.social/tags/database" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>database</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/webDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webDevelopment</span></a> <a href="https://mastodon.social/tags/developer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>developer</span></a> <a href="https://mastodon.social/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a> <a href="https://mastodon.social/tags/csrf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>csrf</span></a></p>
Dark Web Informer - Cyber Threat Intelligence :verified_paw: :verified_dragon:<p>🚨UNVERIFIED🚨Allegedly, a threat actor is selling vulnerabilities related to Prototype Pollution and XSS, which allow for account takeover in <a href="https://infosec.exchange/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a> subdomains.</p><p><a href="https://infosec.exchange/tags/DarkWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkWeb</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattack</span></a> <a href="https://infosec.exchange/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> </p><p><a href="https://x.com/DarkWebInformer/status/1798703628070625636" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">x.com/DarkWebInformer/status/1</span><span class="invisible">798703628070625636</span></a></p>
Angus McIntyre<p>With all the talk about how crappy <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a>'s search results are now, I've not seen much mention of how dangerous Google Ads have become. Websites offering downloads are stuffed with ‘ads’ that display “Click here”, "Download” or “Continue" buttons to trick users into downloading malware. Or a journal's submissions page gets taken over by an ad that says "Now accepting submissions” &amp; links to a totally different site.</p><p>Ad networks are starting to look like just another kind of <a href="https://mastodon.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> attack.</p>
Teri Radichel<p>A Firewall For AWS CloudShell<br>~~<br>ACM.446 Attempting to prevent outbound credential exfiltration via self-XSS<br>~~<br><a href="https://infosec.exchange/tags/cloudshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudshell</span></a> <a href="https://infosec.exchange/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a> <a href="https://infosec.exchange/tags/credentials" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>credentials</span></a> <a href="https://infosec.exchange/tags/container" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>container</span></a> <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> </p><p><a href="https://medium.com/cloud-security/a-firewall-for-aws-cloudshell-8c07bc026415" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/a-fi</span><span class="invisible">rewall-for-aws-cloudshell-8c07bc026415</span></a></p>
:mima_rule: Mima-sama<p><a href="https://makai.chaotic.ninja/tags/Sharkey" rel="nofollow noopener" target="_blank">#Sharkey</a><span>'s recent vulnerability and their handling of it is still miles better than </span><a href="https://makai.chaotic.ninja/tags/Lemmy" rel="nofollow noopener" target="_blank">#Lemmy</a><span>'s </span><a href="https://makai.chaotic.ninja/tags/XSS" rel="nofollow noopener" target="_blank">#XSS</a><span> exploit which actually took down a big instance and is something even more elementary than what Sharkey experienced.<br><br>Like seriously, the first thing you do when </span><a href="https://makai.chaotic.ninja/tags/Markdown" rel="nofollow noopener" target="_blank">#Markdown</a><span> parsing is involved is to sanitize the hell out of it, both in the Markdown input and the HTML output. And you put up a strict </span><a href="https://makai.chaotic.ninja/tags/CSP" rel="nofollow noopener" target="_blank">#CSP</a><span> for good measure. Lemmy spectacularly failed on both counts, despite existing as a project for </span><i><span>years</span></i><span> and a lot more instances (and therefore users, which rivals </span><a href="https://makai.chaotic.ninja/tags/Mastodon" rel="nofollow noopener" target="_blank">#Mastodon</a><span>) using their software!<br><br>I can cut some slack for the Sharkey devs here because:<br><br>- they're relatively new (only months since the project started)<br>- it only affected </span><i><span>note imports</span></i><span> from </span><a href="https://makai.chaotic.ninja/tags/Twitter" rel="nofollow noopener" target="_blank">#Twitter</a><span> which is already niche enough<br>- it was easy to mitigate (just disable note import)<br>- it didn't affect single-user instances IIUC<br>- I haven't seen any Sharkey instance get actually exploited by this<br>- they're taking steps to make sure this shit doesn't happen again (haven't seen this from Lemmy yet, and last I checked their CSP is still shit)<br><br>So this is not worth blowing over in the </span><a href="https://makai.chaotic.ninja/tags/fediverse" rel="nofollow noopener" target="_blank">#fediverse</a><span>. Your assessment is exaggerated, this energy could've been spent somewhere else, and you owe the Sharkey devs an apology.<br><br></span><a href="https://makai.chaotic.ninja/tags/fediversemeta" rel="nofollow noopener" target="_blank">#fediversemeta</a><span> </span><a href="https://makai.chaotic.ninja/tags/security" rel="nofollow noopener" target="_blank">#security</a><span><br><br>RE: </span><a href="https://meowcity.club/fedi/tetra/p/1706812792.496325" rel="nofollow noopener" target="_blank">https://meowcity.club/fedi/tetra/p/1706812792.496325</a></p>
IT News<p>Pro-Russia hackers target inboxes with 0-day in webmail app used by millions - Enlarge (credit: Getty Images) </p><p>A relentless team of pro-Russia... - <a href="https://arstechnica.com/?p=1978806" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1978806</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/wintervivern" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wintervivern</span></a> <a href="https://schleuss.online/tags/roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>roundcube</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/zero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zero</span></a>-day <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a></p>
IT News<p>Thousands of WordPress sites have been hacked through tagDiv plugin vulnerability - Enlarge (credit: Getty Images) </p><p>Thousands of sites running the ... - <a href="https://arstechnica.com/?p=1974522" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1974522</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/cross" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cross</span></a>-sitescripting <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/wordpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wordpress</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/plugins" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>plugins</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a></p>
Teri Radichel<p>Parsing and Validating Lambda Parameters, Headers, and Variables<br>~~<br>ACM.325 Creating a Validation Function to Mitigate Injection Attacks<br>~~<br><a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/Lambda" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lambda</span></a> <a href="https://infosec.exchange/tags/validation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>validation</span></a> <a href="https://infosec.exchange/tags/injection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>injection</span></a> <a href="https://infosec.exchange/tags/parameters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parameters</span></a> <a href="https://infosec.exchange/tags/headers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>headers</span></a> <a href="https://infosec.exchange/tags/variables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>variables</span></a> <a href="https://infosec.exchange/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a> <a href="https://infosec.exchange/tags/code" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>code</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> </p><p><a href="https://medium.com/cloud-security/parsing-and-validating-lambda-parameters-and-environment-variables-334721882e81" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/pars</span><span class="invisible">ing-and-validating-lambda-parameters-and-environment-variables-334721882e81</span></a></p>
Graham Cluley<p>WordPress plugin vulnerability puts two million websites at risk.</p><p><a href="https://grahamcluley.com/wordpress-plugin-vulnerability-puts-two-million-websites-at-risk/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grahamcluley.com/wordpress-plu</span><span class="invisible">gin-vulnerability-puts-two-million-websites-at-risk/</span></a></p><p><a href="https://mastodon.green/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.green/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a> <a href="https://mastodon.green/tags/wordpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wordpress</span></a> <a href="https://mastodon.green/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a></p>
Tod Beardsley<p>On the back of <span class="h-card"><a href="https://infosec.exchange/@albinolobster" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>albinolobster</span></a></span>’s <a href="https://infosec.exchange/tags/CVSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVSS</span></a> agreement research[1]: is it possible for an <a href="https://infosec.exchange/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> exploit to function <em>without</em> a “user interaction” component?</p><p>The easy case I can think of are the <a href="https://infosec.exchange/tags/zeroclick" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroclick</span></a> style exploits - merely browsing a web page triggers the exploit. But of course, the user must do the browsing. Is mere browsing passive enough to qualify as “no user interaction?”</p><p>1: <a href="https://infosec.exchange/@vulncheck/109796076956316819" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@vulncheck/10</span><span class="invisible">9796076956316819</span></a></p>
Tod Beardsley<p>Hey hey. <span class="h-card"><a href="https://infosec.exchange/@Rapid7Official" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Rapid7Official</span></a></span> just published a fairly wide-ranging advisory affecting a bunch of Document Management Systems. It's <a href="https://infosec.exchange/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a>, yawn who cares right? But when you are able to pop a DMS via an unsolicited PDF, well, now you've got a stew going.</p><p>Also, if you're a user of any of these on-prem DMSes, can you make some noise about these? I wasn't able to raise a single vendor via normal <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> disclosure channels, which is surprising for tech / <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> / freemium companies.</p><p>Thanks for all the research work, Matthew-who-is-not-on-Mastodon!</p><p><a href="https://www.rapid7.com/blog/post/2023/02/07/multiple-dms-xss-cve-2022-47412-through-cve-20222-47419/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">rapid7.com/blog/post/2023/02/0</span><span class="invisible">7/multiple-dms-xss-cve-2022-47412-through-cve-20222-47419/</span></a></p>