Top 10 web hacking techniques of 2020

PortSwigger (the company behind BurpSuite) launched it’s yearly community vote for the Top 10 Web Hacking Techniques of 2020.
Visit https://portswigger.net/polls/top-10-web-hacking-techniques-2020 and vote for your favorites.

Exploiting POST-based XSSI
XSS fun with animated SVG
Attacking MS Exchange Web Interfaces
Code injection in Workflows leading to SharePoint RCE
Researching Polymorphic Images for XSS on Google Scholar
Redefining Impossible: XSS without arbitrary JavaScript 
NAT Slipstreaming
Hacking AWS Cognito Misconfigurations
Exploiting “Google BigQuery” SQL Injection
Blind SQL Injection without an “in”
Mutation XSS via namespace confusion – DOMPurify < 2.0.17 bypass
HTTP Request Smuggling in 2020
Blind SSRF exploitation
h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)
The Powerful HTTP Request Smuggling
Exploiting dynamic rendering engines to take control of web apps
Exploiting HSQLDB
SD-PWN Part 2 — Citrix SD-WAN Center
TURN server allows TCP and UDP proxying to internal network
CSS data exfiltration in Firefox via a single injection point
Salesforce Lightning – An in-depth look at exploitation vectors
ImageMagick – Shell injection via PDF password
Bypass SameSite Cookies Default to Lax and get CSRF
A Security Review of SharePoint Site Pages
Forcing Firefox to Execute XSS Payloads during 302 Redirects 
Attacking Secondary Contexts in Web Applications
Smuggling HTTP headers through reverse proxies
XXE-scape through the front door
Portable Data exFiltration: XSS for PDFs 
Marginwidth – the unexpected cross-origin communication channel
WAF evasion techniques
Weird Vulnerabilities Happening on Load Balancers, Shallow Copies and Caches
The unexpected Google wide domain check bypass
Secret fragments: Remote code execution on Symfony based websites
Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2
My hacking adventures with Safari reader mode
Uninitialized Memory Disclosures in Web Applications
Web Cache Entanglement: Novel Pathways to Poisoning
Exploiting email address parsing with AWS SES
Fastjson: exceptional deserialization vulnerabilities
AST Injection, Prototype Pollution to RCE
Real-life OIDC Security (II): Login Confusion
Unauthorized Google Maps API Key Usage Cases
Security and Privacy of Social Logins
Cache-Key Normalization | What could go wrong?
Unauthenticated RCE on MobileIron MDM
The Curious Case of Copy & Paste
A Rough Idea of Data Exfiltration by ReDoS
Write-up for a Path Traversal on Gravitee.io
Advanced MSSQL Injection Tricks
Covert Web Shells in .NET with Read-Only Web Paths
Room for Escape: Scribbling Outside the Lines of Template Security
TLS-poison
Story of a weird vulnerability I found on Facebook

Leave a Comment