{"type":"rich","author_url":"https://blog.hatena.ne.jp/ThisIsOne/","height":"190","title":"Manipulating the WebSocket handshake to exploit vulnerabilities\u3092\u3084\u3063\u3066\u307f\u305f","categories":["PortSwigger"],"description":"Hello there, ('\u03c9')\u30ce \u30da\u30fc\u30b8\u306b\u79fb\u52d5\u3057\u3066\u3001Live chat\u3092\u3002 \u307e\u305a\u306f\u3001\u52d5\u4f5c\u78ba\u8a8d\u3092\u3002 \u30ea\u30af\u30a8\u30b9\u30c8\u306e\u78ba\u8a8d\u3068\u3002 WebSockt\u306e\u78ba\u8a8d\u3092\u3002 \u518d\u5ea6\u3001\u65b0\u3057\u3044\u30e1\u30c3\u30bb\u30fc\u30b8\u3092\u9001\u4fe1\u3057\u3066\u3002 \u30a4\u30f3\u30bf\u30fc\u30bb\u30d7\u30c8\u3057\u3066\u3001\u30da\u30a4\u30ed\u30fc\u30c9\u306b\u5909\u66f4\u3057\u3066\u3002 <img src=1 onerror='alert(1)'> \u3082\u3057\u304f\u306f\u3001\u3044\u3064\u3082\u306e\u30ea\u30d4\u30fc\u30bf\u3092\u5229\u7528\u3057\u3066\u3002 \u30da\u30a4\u30ed\u30fc\u30c9\u306b\u66f8\u304d\u63db\u3048\u3066Send\u3059\u308b\u65b9\u6cd5\u3082\u3042\u308b\u304b\u3068\u3002 Live chat\u3092\u30af\u30ea\u30c3\u30af\u3055\u308c\u308b\u3068\u3001IP\u30a2\u30c9\u30ec\u30b9\u304c\u62d2\u5426\u3055\u308c\u308b\u306e\u3067\u3002 \u30da\u30fc\u30b8\u3092\u30ea\u30ed\u30fc\u30c9\u3057\u3066\u3001\u30a4\u30f3\u30bf\u30fc\u30bb\u30d7\u30c8\u3057\u3066\u3002 \u30a6\u30a7\u30d6\u30b5\u30fc\u30d0\u306b\u63a5\u7d9a\u3059\u308b\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u9001\u4fe1\u5143IP\u30a2\u30c9\u30ec\u30b9\u3092\u7d30\u5de5\u3057\u8ffd\u52a0\u3057\u3066\u3002 X-Forwarded-\u2026","provider_url":"https://hatena.blog","provider_name":"Hatena Blog","blog_url":"https://cysec148.hatenablog.com/","version":"1.0","author_name":"ThisIsOne","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/T/ThisIsOne/20210203/20210203132759.png","width":"100%","blog_title":"Shikata Ga Nai","url":"https://cysec148.hatenablog.com/entry/2021/02/03/144249","published":"2021-02-03 14:42:49","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2021%2F02%2F03%2F144249\" title=\"Manipulating the WebSocket handshake to exploit vulnerabilities\u3092\u3084\u3063\u3066\u307f\u305f - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>"}