Slonser Notes.

Why Protocol Matters: Evil PWA Attack on Casdoor


The article is informative and intended for security specialists conducting testing within the scope of a contract. The author is not responsible for any damage caused by the application of the provided information. The distribution of malicious programs, disruption of system operation, and violation of the confidentiality of correspondence are pursued by law. Introduction In this article, I would like to discuss a vulnerability I discovered in Casdoor, starting with a brief overview:…
Read more ⟶

Deep dive into Extensions Security


The article is informative and intended for security specialists conducting testing within the scope of a contract. The author is not responsible for any damage caused by the application of the provided information. The distribution of malicious programs, disruption of system operation, and violation of the confidentiality of correspondence are pursued by law. Introduction IPv6 Zone I think many people have an idea of what IPv6 and IPv4 addresses look like:…
Read more ⟶

DOM Purify - dirty namespace bypass


The article is informative and intended for security specialists conducting testing within the scope of a contract. The author is not responsible for any damage caused by the application of the provided information. The distribution of malicious programs, disruption of system operation, and violation of the confidentiality of correspondence are pursued by law. Introduction In this article, I want to talk about a method for bypassing DOMPurify when it is used for sanitizing SVG files, which I recently discovered.…
Read more ⟶