Search K
Appearance
Appearance
WhiteIntel is a dark-web fueled search engine that offers free functionalities to check if a company or its customers have been compromised by stealer malwares.
Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware.
You can check their website and try their engine for free at:
There will be occasions where you can execute some limited javascript in a page. For example, in the case where you cancontrol a callback value that will be executed.
In those case, one of the best things that you could do is to access the DOM to call whatever sensitive action you can find in there (like clicking a button). However, usually you will find this vulnerability in small endpoints without any interesting thing in the DOM.
In those scenarios, this attack will be very useful, because its goal is to be able to abuse the limited JS execution inside a DOM from a different page from the same domain with much interesting actions.
Basically, the attack flow is the following:
opener
referencing the initial one)opener
object to access and execute some action in the initial page (which now contains the interesting DOM).โ
Note that even if the initial page access to a new URL after having created the second page, the opener
object of the second page is still a valid reference to the first page in the new DOM.
Moreover, in order for the second page to be able to use the opener object both pages must be in the same origin. This is the reason why, in order to abuse this vulnerability, you need to find some sort of XSS in the same origin.
<script>opener.{callbacl_content}</script>
. Thats why in this example you don't need to indicate the use of opener
explicitly.