Jump to content
Nytro

Stored XSS In Facebook Chat, Check In, Facebook Messenger - Break Security

Recommended Posts

[h=1]Stored XSS In Facebook Chat, Check In, Facebook Messenger - Break Security[/h]

Today, I’m going to share a few of my favorite Stored XSS Findings in Facebook (Facebook Chat, Facebook Check In, Facebook Messenger. These findings are almost always interesting if you happen to find them in the right location.

For instance, what would occur if the Malicious Stored XSS Payload ran on the victim every time they checked in? You could also inject the Payload into the Facebook Chat Screen, which could be really interesting.

There are essentially two different ways to exploit Stored XSS issues.

1.

Let the victim visit our stored XSS Payload (Facebook Check-In, Facebook Messenger, Facebook Chat) on their own.

2.

Exploit it with the URL plus the Stored XSS data.

I wanted to locate an interesting spot within Facebook that would run the data on the victim each time they visited one of my places. I could also just run it through Facebook Chat.

This post will talk a lot about Stored XSS in regard to Facebook Chat, Check-In, Facebook Messenger (Windows Version).

The vulnerabilities mentioned here has been confirmed patched by the Facebook Security Team

Link: Stored XSS In Facebook Chat, Check In, Facebook Messenger | Break Security

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...