all InfoSec news
Strikingly CMS Prototype Pollution
Tenable Research Advisories www.tenable.com
A researcher at Tenable discovered a prototype pollution vulnerability in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications.
The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the …
access applications cms cross-site embedded gadget javascript library object parsing prototype researcher result scripting tenable url vulnerability xss