Remove tag report-uri
article thumbnail

My Blog Now Has a Content Security Policy - Here's How I've Done It

Troy Hunt

I'm a fan (which is why I also recently joined Report URI ), and if you're running a website, you should be too. However, you can add a CSP via meta tag and indeed that's what I originally did with the upgrade-insecure-requests implementation I mentioned earlier when I fixed the Disqus issue.

118
118
article thumbnail

CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction

SecureList

At the end of May, researchers from the nao_sec team reported a new zero-day vulnerability in Microsoft Support Diagnostic Tool (MSDT) that can be exploited using Microsoft Office documents. The data used to describe the link is placed in the tag with attributes Type=”[link] Target=”http_malicious_link!”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A flaw in Microsoft OAuth authentication could lead Azure account takeover

Security Affairs

An attacker could embed an iframe tag into a website with the “src” attribute set to the crafted link, then trick the victim into visiting it. Below the vulnerability timeline: 29/10/19 – The vulnerability found 30/10/19 – Vulnerability reported to Microsoft 31/10/19 – Report was closed by Microsoft – ?!? “While OAuth 2.0

article thumbnail

New Pluralsight Course: Modern Web Security Patterns

Troy Hunt

Me: Ok, but be conscious that means they can never change those scripts without you first modifying the integrity attribute on your script tags and you need time to push that out so as not to break the site. Let me paraphrase: Bank: We're thinking of using SRI to protect malicious modification of scripts we load in from a partner.

Banking 120
article thumbnail

Mmm. Pi-hole.

Troy Hunt

No HTML tags. 2,663 requests (one of which was to Report URI , thank you very much!) Somewhere in the middle is a responsible approach, for example the sponsorship banner you see at the top of this blog. Companies I choose to partner with get to appear there and they get themselves 140 characters and a link. That is all.

DNS 275
article thumbnail

Add-ons, Extensions and CSP Violations: Playing Nice with Content Security Policies

Troy Hunt

A nice, slick, clean set of violation reports from the content security policy (CSP) I run on Have I Been Pwned (HIBP). Logging on to Report URI and being greeted with something like this: This blog post is about how add-ons and extensions in browsers cause CSP violations like the ones above and how they should be dealt with.

Media 214
article thumbnail

Popping Blisters for research: An overview of past payloads and exploring recent developments

Fox IT

Furthermore, there has been a shift in payload type from Cobalt Strike to Mythic agents, matching with previous reporting. Matching with public reporting, we have also seen it as a follow-up in SocGholish infections. Discussing payloads Looking at the dropped payloads, we see that it mostly conforms with what has already been reported.