<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The Bug That Exposed Your PayPal Password in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/The-Bug-That-Exposed-Your-PayPal-Password/m-p/31539#M2108</link>
    <description>&lt;P&gt;Anytime &lt;STRONG&gt;session data&lt;/STRONG&gt; is exposed it's going be bad. While "exploring" the flow of &lt;STRONG&gt;&lt;A href="https://medium.com/@alex.birsan/the-bug-that-exposed-your-paypal-password-539fc2896da9" target="_blank" rel="noopener"&gt;PayPal authentication&lt;/A&gt;&lt;/STRONG&gt; a researcher found just that. In what is known as a cross-site script inclusion (&lt;STRONG&gt;XSSI&lt;/STRONG&gt;) attack, a malicious web page can use an HTML &amp;lt;script&amp;gt; tag to import a script cross-origin, enabling it to gain access to any data contained within the file. What is cool about this one is the fact that&amp;nbsp;&lt;SPAN&gt;although a J&lt;STRONG&gt;avascript obfuscator&lt;/STRONG&gt; was used to randomize variable names on each request, the interesting tokens were still placed in fairly predictable locations, making it possible to retrieve them. It's another great story of how a bug bounty program saved PayPal from imminent&amp;nbsp;self-destruction.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:24:21 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:24:21Z</dc:date>
    <item>
      <title>The Bug That Exposed Your PayPal Password</title>
      <link>https://community.isc2.org/t5/Tech-Talk/The-Bug-That-Exposed-Your-PayPal-Password/m-p/31539#M2108</link>
      <description>&lt;P&gt;Anytime &lt;STRONG&gt;session data&lt;/STRONG&gt; is exposed it's going be bad. While "exploring" the flow of &lt;STRONG&gt;&lt;A href="https://medium.com/@alex.birsan/the-bug-that-exposed-your-paypal-password-539fc2896da9" target="_blank" rel="noopener"&gt;PayPal authentication&lt;/A&gt;&lt;/STRONG&gt; a researcher found just that. In what is known as a cross-site script inclusion (&lt;STRONG&gt;XSSI&lt;/STRONG&gt;) attack, a malicious web page can use an HTML &amp;lt;script&amp;gt; tag to import a script cross-origin, enabling it to gain access to any data contained within the file. What is cool about this one is the fact that&amp;nbsp;&lt;SPAN&gt;although a J&lt;STRONG&gt;avascript obfuscator&lt;/STRONG&gt; was used to randomize variable names on each request, the interesting tokens were still placed in fairly predictable locations, making it possible to retrieve them. It's another great story of how a bug bounty program saved PayPal from imminent&amp;nbsp;self-destruction.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:24:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/The-Bug-That-Exposed-Your-PayPal-Password/m-p/31539#M2108</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:24:21Z</dc:date>
    </item>
  </channel>
</rss>

