Re: [webauthn] Code Injection vulnerability from client side (#1965)

I feel you misunderstood the attack procedure. The user is not tricked into Self-XSS. The attacker performs a Self-XSS on himself so that he can recover the challenge and RP ID from the browser. This is then sent to a trojan running in the background in the user's machine which just prompts the user for UP or UV. As the user gives the same, the signed challenge and authenticator data is sent back to the attacker via the trojan. Here, the user is not entering any code on the browser console.

-- 
GitHub Notification of comment by AdityaMitra5102
Please view or discuss this issue at https://github.com/w3c/webauthn/issues/1965#issuecomment-1722371914 using your GitHub account


-- 
Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config

Received on Sunday, 17 September 2023 02:25:39 UTC