kinugawamasato Profile Banner
Masato Kinugawa Profile
Masato Kinugawa

@kinugawamasato

Followers
15K
Following
1K
Statuses
2K

脆弱性を探す時間が幸せ。

Joined January 2010
Don't wanna be here? Send us removal request.
@kinugawamasato
Masato Kinugawa
4 years
Blogged! I wrote about a Discord's RCE I found. (日本語) (English) (DEMO)
13
504
1K
@kinugawamasato
Masato Kinugawa
18 days
RT @d4d89704243: Introducing the Cookie Sandwich, a tasty technique to steal HttpOnly cookies using legacy RFC features:
0
85
0
@kinugawamasato
Masato Kinugawa
21 days
@slonser_ I noticed the article has been updated :) I'm trying to reproduce it but got an error because SVG doc does not have `document.body`. And even if I set an element on SVG as the target of appendChild, I couldn't confirm that <img onerror> would be executed. Any ideas?
1
0
1
@kinugawamasato
Masato Kinugawa
22 days
@RenwaX23 @slonser_ var style_container = document.createElement('style'); style_container.innerText = `.classname{ background: url(</style><img src=x onerror=alert()>); }`; var host = document.createElement('div'); host.innerHTML = style_container.outerHTML;//alert called
1
0
1
@kinugawamasato
Masato Kinugawa
22 days
RT @slonser_: In 2024, I interacted a lot with Extensions. I decided to create a resource that will help with a basic understanding of ext…
0
94
0
@kinugawamasato
Masato Kinugawa
1 month
RT @orange_8361: The detailed version of our #WorstFit attack is available now! 🔥 Check it out! 👉 cc: @_splitline_
0
212
0
@kinugawamasato
Masato Kinugawa
1 month
昨年のXSSチャレンジの解説です。 自分の解説は68ページから。実際にみつけたバグをベースにした、近年再注目されている文字コードの自動選択を使ったXSSの問題でした。 最後には10年以上前にISO-2022-JPの自動選択を無効化していたある先進的な(?)ブラウザについてもおまけで触れています。
@flatt_security
GMO Flatt Security株式会社
1 month
Flatt Security XSS Challenge の解答・解説スライドを公開しました! 各問題の作問陣 @kinugawamasato @ryotkak @hamayanhamayan 自身による作���です。挑戦した方もそうでない方も、ぜひご覧ください!
2
20
95
@kinugawamasato
Masato Kinugawa
1 month
@shhnjk XSS was on a Blob URL, but I've used the auto-detection trick in the real world. FYI, I also noticed this Chrome's bug at that time:
2
0
15
@kinugawamasato
Masato Kinugawa
2 months
RT @ThreemaApp: Threema 2.0 for desktop (beta), which was audited by @cure53berlin earlier this year, recently passed a bug bounty challeng…
0
28
0
@kinugawamasato
Masato Kinugawa
2 months
RT @S1r1u5_: Imagine opening a Discord message and suddenly your computer is hacked. We discovered a bug that made this possible and earne…
0
171
0
@kinugawamasato
Masato Kinugawa
2 months
@zcorpan @terjanq @shhnjk Yes, it is assumed that you can write arbitrary HTML. I think the hardest puzzle piece to get here is that the existing CSP script-src directive has 'inline-speculation-rules' source expression since as of now, there are almost no apps that use this.
0
0
0
@kinugawamasato
Masato Kinugawa
2 months
RT @sudhanshur705: The challenge is over, so sharing a writeup as the solutions were really interesting. There were three challenges rela…
0
20
0
@kinugawamasato
Masato Kinugawa
2 months
@terjanq @shhnjk Thank you for approving this interesting feature😄 The inline speculation rules are also interesting because it can be used to leak attribute values under certain CSP restrictions without using JS/CSS.
1
0
7
@kinugawamasato
Masato Kinugawa
2 months
RT @MaitaiThe: Here there are the full solves for all of the 3 XSS challenges by @flatt_security. Looking forward…
0
13
0
@kinugawamasato
Masato Kinugawa
3 months
@WeizmanGal Yes, I hope to share more details at some point. But maybe it will be a while before I can release it because this was achieved by combining 3 bugs, 2 of which have yet to be fixed :(
1
0
4
@kinugawamasato
Masato Kinugawa
3 months
スコアボードアプリをハッキングしていないと誓います!!😂
@CybozuBugBounty
Cybozu BugBounty
3 months
今週の年間ランキング(ポイント)です🏆 ポイント数を更新いたしました。 引き続きどうぞよろしくお願いいたします。 #CybozuBugBounty
Tweet media one
2
7
91
@kinugawamasato
Masato Kinugawa
3 months
@MiniMjStar XSS. Check "rules" :)
1
0
1