Content Spoofing is an injection in which user input is reflected as it is in the application response which can be used in phishing attacks. During the recon phase, I found itunesconnect.apple.com , a subdomain of apple and after digging into it, I had observed that the content of the error key parameter was reflecting back to the page as shown below Payload - https://itunesconnect.apple.com/login?errorKey=This%20message%20can%20be%20changed%20by%20attacker.%20This%20is%20content%20spoofing%20till%20now.%20Let%20try%20to%20exploit%20it%20further. With normal inline Cross-Site Scripting(XSS) payloads, the application was giving a blank pop-up. After trying different scenarios, I have observed that dangling markup injection is possible on the vulnerable parameters (errorKey) Let’s understand the concept of Dangling Markup Injection Dangling markup injection is very useful where we can’t find a way to execute our JavaScript due to input filters, content security policy,...
Educational Purpose - Case study, attacks' scenarios and audit guidelines on vulnerabilities AI Powered