appsec.fyi · Sources

stackoverflow.com

10 curated AppSec resources from stackoverflow.com across 8 topics on appsec.fyi.

stackoverflow.com

Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2025-08-14.

Date Added Resource Excerpt
2025-08-14 2025oauth 2.0 - How does CSRF work without state parameter in OAuth2.0? - StackCSRFReference on CSRF vulnerabilities in OAuth 2.0, detailing an attack flow where an attacker intercepts a callback URL and tricks a logged-in user into visiting it. This exploit allows the attacker to gain unauthorized access to the victim's account on the service provider by exchanging the resulting authorization code for an access token. The discussion specifically questions the role of the state parameter in preventing such Cross-Site Request Forgery attacks within the OAuth 2.0 framework.
2025-08-14 2025ruby - Sinatra CSRF Authenticity tokens - Stack OverflowCSRFLibrary demonstrating CSRF authenticity tokens in the Sinatra web framework. This resource addresses how to implement CSRF protection, specifically noting Sinatra's use of Rack Protection. It provides guidance on generating or utilizing these tokens to secure user input forms within Sinatra applications.
2025-08-14 2025asp.net - Bypass XSS blacklist "", "&" input nvarchar - Stack OverflowXSSLibrary for bypassing XSS blacklists on ASP.NET applications. This resource details a scenario where a blacklisting approach fails to prevent Cross-Site Scripting, even when character inputs like `<`, `>`, and `&` are blocked. The vulnerability arises because the application stores user input in `nvarchar` fields and later outputs it as JavaScript variables. While the JavaScript encoding escapes characters within the string variables, it does not prevent XSS when these variables are rendered into the HTML.
2024-11-29 2024Python Twisted proxy - how to intercept packetsBurpPythonLibrary for intercepting and modifying HTTP request and response bodies using Python's Twisted framework. Demonstrates a basic proxy setup using `twisted.web.proxy` and `twisted.internet.reactor`, enabling developers to inspect and alter data as it flows through the proxy. The provided code snippet serves as a starting point for building custom HTTP proxy functionalities.
2023-10-03 2023Is XSS Attack via PDF Javascript Possible?XSSAnalysis of PDF JavaScript execution in browsers, investigating its potential for XSS attacks. The entry addresses whether JavaScript embedded within PDF documents, like the example using `app.alert`, can access browser data such as cookies or perform redirects, and whether sandboxing mechanisms prevent such actions when PDFs are opened via a web browser.
2023-05-21 2023JWT (Json Web Token) Audience aud versus Client_Id - What's the difference?AuthNJWTReference explaining the JWT `aud` (Audience) claim, detailing its purpose in identifying intended recipients according to RFC 7519. It highlights that the `aud` claim is optional and application-specific, requiring recipients to validate if their identifier is present in the claim's string or array values. The entry clarifies that `aud` differs from OAuth Client ID and provides an example of using it to distinguish between access and refresh tokens.
2021-12-06 2021How to run BeEF behind an nginx reverse proxy with SSL correctlyReconLibrary for configuring BeEF behind an nginx reverse proxy with SSL, addressing "Blocked Mixed Active Content" errors. It details BeEF's `config.yaml` settings for `allow_reverse_proxy`, `public`, and `public_port`, along with Nginx `proxy_pass` directives to correctly handle HTTPS requests and ensure BeEF hooks function on secure pages.
2021-10-07 2021What content-type's execute javascript in the browser?XSSReference discussing JavaScript execution based on `Content-Type` headers in browsers. It highlights that while `text/html` is the standard, some browsers (specifically IE) may execute JavaScript in other types like `application/form-data` or `text/xhtml+xml`. The entry also notes that browser behavior can be influenced by file extensions (`.htm`, `.html`), overriding MIME type expectations, particularly to handle malformed server configurations.
2021-02-28 2021How to learn internals of the Go Programming Language? For noob - Stack OveReference for Go internals, focusing on understanding core concepts rather than specific implementation details that may change between releases. Emphasizes the "why" behind features like channels, explaining their synchronization and buffering capabilities, and their advantages over manual mutex use due to the `select` statement. It also covers goroutines, differentiating them from OS threads and highlighting benefits such as the integrated network poller and dynamic stacks. Key topics include slices, interfaces, string encoding, `[]byte` conversion, blocking I/O, and scheduler mechanics (P, G, M).
2016-01-21 2016python/scapy DNS sniffer and parser - Stack OverflowPythonLibrary using Scapy to sniff and parse DNS traffic. The provided Python code demonstrates how to capture UDP packets on port 53, distinguishing between DNS queries (DNSQR) and responses (DNSRR), and extracting timestamp information.