Pythonç·¨ããSASTãã¼ã«ã¨ã¯ï¼ã«ã¤ãã¦ã¯ãã¡ã kusuwada.hatenablog.com ä»åã¯JavaScriptã§ä½¿ããSASTãã¼ã«ãç´¹ä»ãã¾ãã npm-audit npm-audit ã¨ã¯ å®è¡ NodeJsScan NodeJsScan ã¨ã¯ installã¨å®è¡ LGTM LGTMã¨ã¯ ç»é²ã¨å®è¡ åèãªã³ã¯ npm-audit npm-audit ã¨ã¯ npm@6ã§è¿½å ãããæ©è½ãnpm install ãå®è¡ããã¨èªåçã«å®è¡ãããã¤ã³ã¹ãã¼ã«ãã node_module ã«å¯¾ãæ¢ç¥ã®èå¼±è£½ã®æç¡ã®ç¢ºèªã宿½ããã¬ãã¼ããåºåãã¾ããã¬ãã¼ãã«ã¯ã坾妿¹æ³ã«é¢ããæ å ±ãå«ã¾ãã¦ãã¾ãã ã¾ããversion-upãªã©ã§èªåä¿®æ£å¯è½ãªå ´å㯠npm audit fix ã³ãã³ãã§èªåçã«èå¼±æ§ãä¿®æ£ããããã¨ãåºæ¥ã¾ãã å ¬å¼ããã¥ã¡ã³ããã¼ã¸ å®è¡ å®è¡ã¯ç°¡
Service Worker ã®å®è£ ã主è¦ãã©ã¦ã¶ã§æãå§ãã¦çãä¸ãã£ã¦ãã¾ãããããã®æµãã«ä¾¿ä¹ãã¦ä¹ ãã¶ãã« Service Worker ã®ä»æ§ãå®è£ ã«é¢ããè¨äºãæ¸ãã¦ã¿ã¾ãããä»å㯠Service Worker ã¹ã¯ãªããã®ã¤ã³ã¹ãã¼ã«ã¨æ´æ°å¦çã«ã¤ãã¦ã§ãã ãã®è¨äºã¯ Service Worker ã¹ã¯ãªãããå°ãã§ãææ¸ããã¦åããããã¨ãããäººãæ³å®èªè ã«ãã¦ãã¾ããService Worker ã«ã¤ãã¦å ¨ãç¥ããªã人ã¯ã¾ãå¥ã®å ¥éè¨äºãåç §ãã¦ãã ãããã¾ããç´°ãããã¨ãæ°ã«ããã« Service Worker ã使ããã人㯠Workbox ã¨ãã£ãã©ã¤ãã©ãªããã¬ã¼ã ã¯ã¼ã¯ã®å©ç¨ããããããã¾ãã æ´æ°å±¥æ´ 2019/09/24: Chrome 78 ãã importScripts() ãæ´æ°å¯¾è±¡ã«ãªãã¾ãããããã«ã¤ãã¦å çãã¾ããã 2018/06/07:
Shibuya.XSS techtalk #10 ã®çºè¡¨è³æã§ãã
JavaScriptä¸ç´è ã¸ã®éã5. ã³ã¼ã«ããã¯é¢æ°ã JavaScriptã®ã¤ã¾ã¥ããããããªã¨ãã 颿°ã¯ãªãã¸ã§ã¯ãã®ä¸ç¨® 4種é¡ã®this 颿°ã¹ã³ã¼ã éåæé¢æ° ã³ã¼ã«ããã¯é¢æ° â ãã¾ãã ã¯ãã¼ã¸ã£ ãããã¿ã¤ãç¶æ¿ ã³ã¼ã«ããã¯é¢æ°ã¨ã¯ æ¢ã«ã颿°ã®å¼æ°ã«é¢æ°ã渡ãããã¨ãããã¨ãå¦ã³ã¾ããã ãããå©ç¨ãã¦ããããç¹å®ã®å¦çãçµãã£ããã弿°ã«æ¸¡ãã颿°ã®å¦çãå®è¡ãããã¨ãã£ãããã« å¦çã®ããã¼ãå¶å¾¡ãããã¨ãåºæ¥ã¾ãã(ã¨ãããããéåæã®å ´åã¯å¶å¾¡ããå¿ è¦ãããã¾ã) ãã®éã弿°ã«æ¸¡ããã颿°ã®ãã¨ããã³ã¼ã«ããã¯é¢æ°ãã¨ããã¾ãã Wikipediaã®ã³ã¼ã«ãã㯠(æ å ±å·¥å¦)ãè¦ãéããåæ/éåæé¢ä¿ç¡ãã弿°ã«é¢æ°ãåãå®è£ ãæãã¦ããããã§ãã ã§ãããJavaScriptçéã§ãã³ã¼ã«ããã¯é¢æ°ãã¨ããã°ãéåæå¦çã«é¢ããè¨äºãå¤ãè¦åãã
以ä¸ã§ã¯ããã³ã¼ã«ããã¯é¢æ°ã弿°ã§åãåã颿°ãã¨ã弿°ãæããªãã³ã¼ã«ããã¯é¢æ°ããå®ç¾©ããå¼ã³åºãã¦ãã¾ãã function f1(callback){ console.log('f1'); callback(); } function f2() { console.log('f2'); } f1(f2); //=> f1 //=> f2 ã§ã¯ããã³ã¼ã«ããã¯é¢æ°ã弿°ã§åãåã颿°ãã«ãã弿°ã®ããã³ã¼ã«ããã¯é¢æ°ããæ¸¡ãã«ã¯ã©ãããã°ããã§ããããã æ¹æ³1 ãã³ã¼ã«ããã¯é¢æ°ãåãåã颿°ãã®å®ç¾©ããã³ã¼ã«ããã¯é¢æ°ã®å¼æ°ãèªèº«ã®å¼æ°ã¨ãã¦åãåãããã«å¤æ´ãã¾ãã function f1(callback, arg1){ console.log('f1'); callback(arg1); } function f2(arg1) { console.log(arg1); }
æ°ãµæåãç§ã¯Googleããããããã£ã¨æ£ç¢ºã«è¨ãã¨Googleã¹ããªã¼ããã¥ã¼ãå©ç¨ãã¾ãããGoogleã¹ããªã¼ããã¥ã¼ã¯åä¾ã®é ã«æãæããæªæ¥çãªãã¬ãã¼ãã¿ããã§ãã¨ã¦ãæ°ã«å ¥ã£ã¦ãã¾ããç§ã¯ãæ®æ®µããããããã«ããã®æãã¢ãã¬ã¹ãã¼ãè¦ã¾ããã2014å¹´ã®ãã¤é ãããããã©ã¡ã¼ã¿ã¯åãªãã¯ã¨ãªã®æååã§ã¯ãªããªãããã®ä»£ããã«æå符ã§åºåãããè±æ°åã®å¥å¦ãªå¯ãéãã«ãªã£ãããã§ãã é£è§£ã§ãç¾å¨ã®ã¨ããå ¬éãããããã¥ã¡ã³ãã¼ã·ã§ã³ããªããå¤ãã®äººã ã«æ¯æ¥ä½¿ç¨ããããªãã¼ã¹ã¨ã³ã¸ãã¢ãªã³ã°ãå¯è½ãªãããã³ã«ãããããã³ã¼ããç®ã®åã«ããã¨ãç§ã¯è§£èªãããã¦ã¦ãºã¦ãºãã¦ãã¾ãã ç§ã¯ãã©ã¦ã¶ã®Webã³ã³ã½ã¼ã«ãè¦ã¦ã¿ã¾ãããAJAX APIã¸ã®ãªã¯ã¨ã¹ããåãããã«ã¨ã³ã³ã¼ãããã¦ããã ãã§ã¯ãªããããã¬ã¹ãã³ã¹ã®ä¸é¨ãç»åã ã£ãå ´åããã®ä»ã®ã¬ã¹ãã³ã¹ã¯æå·ãç¨ãããã¤ããª
â»2017/4/21ã«ãªã³ãã¼ãæã®ãããã°æ¹æ³8ã追è¨ãã¾ããï¼ ããã«ã¡ã¯ï¼ã¨ã¤ãã¼ã å¼è¶ãä¾ã®å è¤ã§ãï¼ ã¿ãªããJavaScriptæ¸ãã¦ã¾ããï¼ console.logãã£ã¡ã使ãããã¼ã£ã¦äººã¯ç®ãããããã®ãããã°æ¹æ³ãã ã±ã¼ã¹æ¯ã«ç´¹ä»ãã¦ãããã¨æãã¾ãã(åã¯console.log使ãã¾ãã) ãµã¼ãã¼ã«ãããã°ç¨ã®ã³ã¼ããã¢ãããã¼ããããã¨ç¡ãã®ã§ã æ¶ããã«æå³ã«åãã¦ãªãªã¼ã¹ãã¦ãã¾ãå±éºæ§ããªãã®ããå§ãã§ãã åæç¥è F12ã§åºã¦ãããããããã¼ãã¼ã«(Elements, Console, Source, Network)ã®ç¥è Ctrl+Shift+Fã§å¤é¨ã½ã¼ã¹(js,css)ã«å¯¾ãã¦ä¸æ¬æ¤ç´¢ãã§ãã HTMLãCSSã¯Elementsããç´æ¥ä¿®æ£â確èªãã§ãã jsã¯Sourceããç´æ¥ä¿®æ£ã§ãã(Ctrl+Sã§ä¿åããããã®ç¶æ ã§å®è¡ã§ãã) jsã¯
Address Space Layout Randomization Address space layout randomization or ASLR in short is a first line of defense against attackers targeting Internet users. ASLR randomizes the location of an applicationâs code and data in the virtual address space in order to make it difficult for attackers to leak or manipulate the data or reuse the code in order to compromise the application. Combined with the
ååã¯ãDOM-based XSSã®åå ã¨å¯¾çã«ã¤ãã¦ã®æ¦ç¥ã解説ããDOM-based XSSãå¼ãèµ·ããã·ã³ã¯ã®äºä¾ã¨ãã¦innerHTMLã¸ã®HTMLã®ä»£å ¥ãlocationãªãã¸ã§ã¯ãã¸ã®URLã®ä»£å ¥ãã¨ãããã¾ãããä»åã¯ãinnerHTMLãlocationãªãã¸ã§ã¯ãã»ã©é »ç¹ã§ã¯ãªããã®ã®ãå®éã«DOM-based XSSã®åå ã¨ãã¦è¦ãããã·ã³ã¯ã®ä»£è¡¨çãªãã®ã«ã¤ãã¦èª¬æãã¾ãã document.writeï¼document.writelnï½ã§ããã ã使ãããä»£æ¿ææ®µãå©ç¨ãã DOMã®ã¬ã³ããªã³ã°ãé å»¶ããããªã©ã®çç±ããã以åã«æ¯ã¹ãã¨document.writeã®ä½¿ç¨ãããé »åº¦ã¯æ¸ã£ã¦ãã¾ãããããã§ããªãåºåç¨ã®JavaScriptãªã©ä¸é¨ã§ã¯æ ¹å¼·ãdocument.writeã使ããã¦ãã¾ããdocument.writeãdocument.writelnã§ã¯ãå¼
第3åWebã»ãã¥ãªãã£ã®ãããã ãã®3 CSRFã»ãªã¼ãã³ãªãã¤ã¬ã¯ãã»ã¯ãªãã¯ã¸ã£ããã³ã° ã¯ããããããã 2016-07-13
宿ãªã³ãã¼&ãã¼ã¹ãã«ããã¯ãªãããã¼ããä»ãã¦ã¦ã¼ã¶ã¼ã«ä»»æã®ã³ã¼ããå®è¡ãããPoCãPastejackingããå ¬éãã話é¡ã«ãªã£ã¦ãã¾ãã詳細ã¯ä»¥ä¸ããã ç±³ã»ãã¥ãªãã£ä¼æ¥Malwarebytesããã¿ã¼ããã«ã¸ã®ã³ãã¼ï¼ãã¼ã¹ããå®è¡ããããã¨ã§ãä»»æã®ã³ã¼ããå®è¡ããããã¨ã®åºæ¥ããæ¦å¿µå®è¨¼ãPastejackingãã®å±éºæ§ãä¼ãã¦ãã¾ãã Browsers now allow developers to automatically add content to a userâs clipboard, following certain conditions. Namely, this can only be triggered on browser events. This post details how you can exploit this to trick a
ãµã¨Redditã®Webdevæ¿ãè¦ã¦ããããã¦ã§ãã»ãã¥ãªãã£ã«ã¤ãã¦å°ãè峿·±ãè¨äºããã£ãã®ã§ã·ã§ã¢ãããã¨æãã¾ãã è¨äºã®ã¿ã¤ãã«ã¯ãTarget=â_blankââââthe most underestimated vulnerability everãã æ¥æ¬èªã§ããã¨ãtarget="_blank" ã¯æãéå°è©ä¾¡ããã¦ããèå¼±æ§ãã¨ããã¨ããã§ããããã ã§ã¯ãé ã追ã£ã¦å°ããã¤è¦ã¦è¡ãã¾ãããã ãã¾ã target="_blank" ã¨ã¯ï¼ã target="_blank" ã¯ä»ã®ãã¼ã¸ã¸ã®ãªã³ã¯ã«å©ç¨ããããã®ã§ãç°¡åã«ããã¨ãæ°ããã¿ãã¨ãã§ãã¼ã¸ã§éãã¦ããã¨ããå½ä»¤ã§ãã ä¾ï¼ Yahoo! HTMLã¿ã°ã§ããã¨ãããªã£ã¦ãã¾ãã <a href="http://yahoo.co.jp/" target="_blank">Yahoo!</a> ã¤ã¾ããtar
ã©ãããã¾ãã¨ããï¼@0310lanï¼ã§ãã ã¿ãªããã¯ããJavaScriptããã©ã®ãããªæ¹æ³ã§å¦ç¿ããã¦ããã§ããããï¼ ãæè»½ãªæ¹æ³ã¨ãã¦ã¯â¦ã ã»æ¸ç±ãããã°è¨äºãèªã ã»åå¼·ä¼ã»ã»ããã¼ã¸åå ãã ã»å人ãå 輩ã«ç´æ¥èã ã»å¦ç¿åãã®Webãµã¼ãã¹ãå©ç¨ãã ã»etc... ãªã©ãä¸è¬çã§ããããã ä»åã¯ãä¸è¨ã®ãªã¹ãã«å ãã¦ãããï¼ã¤æå¹ãªæ¹æ³ã§ãããæµ·å¤ã®ç¡æåç»ãã«ã¤ãã¦ãç´¹ä»ãããã¨æãã¾ãï¼ ãã©ãããè±èªã ããâ¦ãã¨ãã¤ãæ¬é ããã¡ã§ãããæµ·å¤ã¦ã¼ã¶ã¼ãä½ãããã°ã©ãã³ã°å¦ç¿åç»ã¯ãå½å ã«æ¯ã¹ã¦å§åçã«ã質ããé«ãã®ãç¹å¾´ã§ãã ãªãã§ããç¹ã«è§£èª¬ãä¸å¯§ã§çè§£ããããåç»ã ããå³é¸ãã¾ããã®ã§ããã²ãã§ãã¯ãã¦ã¿ã¦ãã ããï¼ â ãJavaScriptãã®åºæ¬ãå¾¹åºçã«å¦ã¶ï¼ ã¾ãã¯ãJavaScriptããã©ã®ããã«æ¸ãããè¯ãã®ãï¼ããä¸å¯§ã«æãã¦ãããåç»ã®ã
ã©ã³ãã³ã°
ãç¥ãã
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}