Jump to content

Abusing JSONP with Rosetta Flash


hake

Recommended Posts

  • Staff

Yes, as this is not really the type of exploit that MBAE, EMET, Sandboxie would deal with, it is outside the scope of all. It basically allows a malicious third party to bypass the JSONP filter to load scripts between domains to be able to steal private information such as cookies, something that's not allowed by same-origin policy. It's something that websites need to fix on their end.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.