
XSS on Google Search - Sanitizing HTML in The Client?
Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=lG7U3fuNw3A
An actual XSS on google.com by Masato Kinugawa. It abuses a parsing differential between a JavaScript enabled and disabled context.
The fix: https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Other Videos By LiveOverflow
Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
xss
cross-site scripting
html
sanitization
encoding
browser
masato
cure53
google
gws
google search
parser differential
javascript
mxss
mutation xss
dom xss
template
div
parsing
context
javascript disabled
noscript
script
regex
html parser
dompurify