Closed
Bug 1299351
Opened 9 years ago
Closed 9 years ago
*.mozilla.org
Categories
(Websites :: Other, defect)
Websites
Other
Tracking
(Not tracked)
RESOLVED
INVALID
People
(Reporter: dvs.cissp, Unassigned)
Details
(Keywords: reporter-external, Whiteboard: [reporter-external] [web-bounty-form] [verif?])
Attachments
(1 file)
|
826.58 KB,
image/png
|
Details |
Steps:
1. Create a simple HTML file with my XSS payload:
<p>Drag me!</p> <script> document.addEventListener("dragstart", function(event) { event.dataTransfer.setData("text/plain", "javascript:prompt(document.domain)"); }); </script>
2. Go to: *.mozilla.org
3. Drag and drop into the drawing module, and the XSS is there :)
Flags: sec-bounty?
I test on Google Chrome 52.0.2743.116 m (64-bit)/ Windows 10 64bit
Comment 3•9 years ago
|
||
Self-xss is does not qualify, this isn't a security flaw.
Group: websites-security
Status: UNCONFIRMED → RESOLVED
Closed: 9 years ago
Resolution: --- → INVALID
Updated•9 years ago
|
Flags: sec-bounty? → sec-bounty-
Updated•1 year ago
|
Keywords: reporter-external
You need to log in
before you can comment on or make changes to this bug.
Description
•