Password reset poisoning via dangling markup

1️⃣ Leaving the <img> tag open
Some websites block malicious JavaScript.
If you don’t close the
<img>tag, the browser may auto-complete it incorrectly and execute your script.Example:
<img src=x onerror=alert('XSS')
2️⃣ Using ?/ in URLs
Some websites don’t handle URLs correctly.
Adding
?/might trick the website into returning more data than expected.Example:
<https://example.com/email?/>
This might expose all emails instead of just one!
Last updated