(no title)
superasn | 2 months ago
Imagine just one link in a tweet, support ticket, or email: https://discord.com/_mintlify/static/evil/exploit.svg. If you click it, JavaScript runs on the discord.com origin.
Here's what could happen:
- Your Discord session cookies and token could be stolen, leading to a complete account takeover.
- read/write your developer applications & webhooks, allowing them to add or modify bots, reset secrets, and push malicious updates to millions.
- access any Discord API endpoint as you, meaning they could join or delete servers, DM friends, or even buy Nitro with your saved payment info.
- maybe even harvest OAuth tokens from sites that use "Login with Disord."
Given the potential damage, the $4,000 bounty feels like a slap in the face.
edit: just noticed how HN just turned this into a clickable link - this makes it even scarier!
jdsleppy|2 months ago
I believe if you always keep session cookies in secure, HTTP-only cookies, then you are more resilient to this attack.
I interviewed frontend devs last year and was shocked how few knew about this stuff.
notnullorvoid|2 months ago
It's true that an HTTP-only session cookie couldn't be directly taken, but it's trivial to present the user with a login screen and collect their password (and OTP), at which point you can easily get a session remotely. It can look entirely like the regular login page right down to the url path (because the script can modify that without causing a page load).
giancarlostoro|2 months ago
ddlsmurf|2 months ago
hackermondev|2 months ago
s_ting765|2 months ago
z3t4|2 months ago
abustamam|2 months ago
j-krieger|2 months ago
netdevphoenix|2 months ago
why-o-why|2 months ago
Terrifying.
snvzz|2 months ago
And serves a reminder crime does pay.
In the black market, it would have been worth a bit more.
imdsm|2 months ago
doctorpangloss|2 months ago
tptacek|2 months ago
panzi|2 months ago
Discord uses HttpOnly cookies (except for the cookie consent banner).
compootr|2 months ago
unknown|2 months ago
[deleted]