OffensiveWeb
Docs
  • Getting started
    • Introduction
    • Learning
    • Vulnerability / CTF reports
    • Cheatsheets
  • Client-side
    • Service Worker
    • DOM Clobbering
    • HTML Tags
    • Window object
    • XSS - Cross-site Scripting
    • Browser Cache
    • CSP Bypass
    • JSONP
    • Same Origin Method Execution
    • XSLeaks
  • Framework
    • Apache
    • DOMPurify
    • Drupal
    • Express.js
    • HTMX
    • Nginx
    • Node.js
    • Nuxt
    • Spring Boot
    • VueJS
    • Werkzeug
    • Wordpress
  • HTTP
    • Content-Type
    • Cookie
    • Cross-Origin Read Blocking (CORB)
    • Cross-Origin Resource Policy (CORP)
    • Cross-Origin Resource Sharing (CORS)
    • X-Content-Type-Options (XCTO)
  • Others
    • Browser exploit
    • Burpsuite
    • Debugging
    • Open Redirect
    • Parsing
    • Prototype Pollution
  • Programming
    • Ruby
    • Javascript
      • Javascript
      • Strange behavior
    • PHP
    • Python
      • Python
      • Class Pollution
      • Format String
  • Server-side
    • GraphQL
    • Server-Side Caching
    • SQL Injection
    • SSRF - Server-side Request Forgery
    • SSTI
      • Django Template
      • EJS
      • Pug
      • Tera
  • WriteUp
    • SEKAI CTF 2023 - Golf Jail
OffensiveWeb
  • Getting started
  • Client-side
  • Server-side
  • Framework
  • HTTP
  • Twitter
  • GitHub
Get started
Get started

Search

Loading search index…

No recent searches

No results for "Query here"

  • to select
  • to navigate
  • to close

Search by FlexSearch

  • Getting started
    • Introduction
    • Learning
    • Vulnerability / CTF reports
    • Cheatsheets
  • Client-side
    • Service Worker
    • DOM Clobbering
    • HTML Tags
    • Window object
    • XSS - Cross-site Scripting
    • Browser Cache
    • CSP Bypass
    • JSONP
    • Same Origin Method Execution
    • XSLeaks
  • Framework
    • Apache
    • DOMPurify
    • Drupal
    • Express.js
    • HTMX
    • Nginx
    • Node.js
    • Nuxt
    • Spring Boot
    • VueJS
    • Werkzeug
    • Wordpress
  • HTTP
    • Content-Type
    • Cookie
    • Cross-Origin Read Blocking (CORB)
    • Cross-Origin Resource Policy (CORP)
    • Cross-Origin Resource Sharing (CORS)
    • X-Content-Type-Options (XCTO)
  • Others
    • Browser exploit
    • Burpsuite
    • Debugging
    • Open Redirect
    • Parsing
    • Prototype Pollution
  • Programming
    • Ruby
    • Javascript
      • Javascript
      • Strange behavior
    • PHP
    • Python
      • Python
      • Class Pollution
      • Format String
  • Server-side
    • GraphQL
    • Server-Side Caching
    • SQL Injection
    • SSRF - Server-side Request Forgery
    • SSTI
      • Django Template
      • EJS
      • Pug
      • Tera
  • WriteUp
    • SEKAI CTF 2023 - Golf Jail

On this page

  • Definition
  • References

Same Origin Method Execution

On this page
  • Definition
  • References

Definition#

Same-Origin Method Execution (SOME) is a security vulnerability that allows an attacker to execute functions of a web application in the context of another user’s session. This attack exploits the same-origin policy of web browsers but requires that the target website contains a suitable vulnerable function and that the attacker tricks the user into executing malicious JavaScript in their browser.

References#

  • Real World CTF 2023 - The cult of 8 bit
  • Youtube - Intigriti XSS challenge 1022
  • HackTricks - SOME
  • SOME Attack
  • Bypass CSP Using WordPress By Abusing Same Origin Method Execution
Prev
JSONP
Next
XSLeaks
    • Brought to you by Hyas