Masato Kinugawa (@kinugawamasato) 's Twitter Profile
Masato Kinugawa

@kinugawamasato

脆弱性を探す時間が幸せ。

ID: 104911452

linkhttps://masatokinugawa.l0.cm/ calendar_today14-01-2010 19:47:31

1,1K Tweet

14,14K Followers

250 Following

Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm very happy to finally share the second part of my DOMPurify security research 🔥 This article mostly focuses on DOMPurify misconfigurations, especially hooks, that downgrade the sanitizer's protection (even in the latest version)! Link 👇 mizu.re/post/exploring… 1/2

GMO Flatt Security Inc. (@flatt_sec_en) 's Twitter Profile Photo

We have published a blog post by RyotaK RyotaK ! It showcases techniques for achieving RCE by chaining multiple issues in a well-known Japanese business application built with Electron. Be sure to check it out! flatt.tech/research/posts…

Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

Firefoxで見つけたSOPバイパス、CSPバイパス、XSS関連の脆弱性について話すクラ〜 browsercrashclub.connpass.com/event/350203/

Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

インタビュー答えました。 いつまでも手探りでバグ探してるようなかんじなのにバグハンター歴14年は客観的にみたら大ベテランでやばい

slonser (@slonser_) 's Twitter Profile Photo

I think many people are familiar with the topic of blind CSS exfiltration, especially after the post by Gareth Heyes \u2028 However, an important update has occurred since then, which I wrote below ->

Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

昨年見つけたFirefoxの脆弱性について解説した Browser Crash Club #1 のスライドを公開しました!ありがとうございました!! #browsercrashclub speakerdeck.com/masatokinugawa…

slonser (@slonser_) 's Twitter Profile Photo

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? ->
Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

lol, this works on Firefox: <object data=# codebase=javascript:alert(document.domain)//> OR <embed src=# codebase=javascript:alert(document.domain)//>

Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

#shibuyaxss、Shadow DOMによるカプセル化を突き破る様々な手法を紹介しながら、Shadow DOMをセキュリティ用途で使うことの是非について話します〜 shibuyaxss.connpass.com/event/357393/

Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

🚨 Heads up for web devs! 🚨 The HTML spec just got an important update to protect against mutation XSS (mXSS). Find out how escaping < and > in attributes is making the web a safer place. bughunters.google.com/blog/503874286…

Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

Did you know that when Flash was killed, all major browsers started replacing certain URLs specified in <object> for compat? See: github.com/whatwg/html/is… I first learned about it last month and found this Firefox bug: mozilla.org/en-US/security…