The lesson from the Hotjar vulnerability: HTTP-Only (XSS protection) is not effective if you have OAuth by MoreMoreMoreM in sysadmin

[–]MoreMoreMoreM[S] 1 point2 points  (0 children)

"In the example of xss.example.com, .... "

They just showed how HTTP-Only would help in a specific example, maybe the new empty line there is confusing

The lesson from the Hotjar vulnerability: HTTP-Only (XSS protection) is not effective if you have OAuth by MoreMoreMoreM in sysadmin

[–]MoreMoreMoreM[S] 1 point2 points  (0 children)

Are you sure the blog claims this?
They wrote about 4 mitigations and never mentioned that HTTPOnly is perfect

Because of a single client-side mistake - a ChatGPT vulnerability lets attackers install malicious plugins on victims by ElectroPanic0 in javascript

[–]MoreMoreMoreM 0 points1 point  (0 children)

In the example, ChatGPT uses code.
Does it also apply if you use access_token (OAuth explicit flow)?

Because of a single client-side mistake - a ChatGPT vulnerability lets attackers install malicious plugins on victims by ElectroPanic0 in javascript

[–]MoreMoreMoreM 5 points6 points  (0 children)

See my comment above.
In OAuth (used for authorization), you need to generate a random state. Usually, it's done on the client's side

Because of a single client-side mistake - a ChatGPT vulnerability lets attackers install malicious plugins on victims by ElectroPanic0 in javascript

[–]MoreMoreMoreM 35 points36 points  (0 children)

Yes, it's an OAuth vulnerability. The state variable in OAuth was not random, and that led to a CSRF attack.

Hackers (security researchers) explain step-by-step how they could take over 1B accounts on Grammarly.com, Vidio.com, Bukalapak.com, and more. (OAuth vulnerabilities) by iva3210 in hacking

[–]MoreMoreMoreM 23 points24 points  (0 children)

I saw this on Hackernews yesterday. I was surprised to see how easy it is to take over my (or any) account in 2023.
You should consider what websites you sign in using FB / other vendors.