May 8, 2023, 2:57 p.m. | Evan Grant

Tenable Research Advisories www.tenable.com

Strikingly CMS Prototype Pollution

A researcher at Tenable discovered a prototype pollution vulnerability in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications. 


The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the …

access applications cms cross-site embedded gadget javascript library object parsing prototype researcher result scripting tenable url vulnerability xss

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India

Cyber Program Manager - CISO- United States – Remote

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Network Security Engineer (AEGIS)

@ Peraton | Virginia Beach, VA, United States

SC2022-002065 Cyber Security Incident Responder (NS) - MON 13 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Information Systems Security Engineer

@ Booz Allen Hamilton | USA, GA, Warner Robins (300 Park Pl Dr)