Nov. 14, 2023, 10:14 a.m. | Emin Skrijelj

System Weakness - Medium systemweakness.com

Exploiting XSS using Polyglot JPEGs+Javascript to bypass CSP

Introduction

This vulnerability allows an attacker to use a JPEG polyglot with JavaScript to hide the malicious JavaScript payload in the image successfully without corrupting the image to bypass the site's CSP. For this exploit you will need two parameters, one to call the malicious image and the other one to upload it.

Polyglot

Polyglot refers to a file or data that is designed to be interpreted or processed as multiple …

attacker bypass call csp exploit exploiting hide image information security javascript jpeg malicious payload pentesting polyglot vulnerability xss

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC