Super cool research and talk
---
RT @spaceraccoonsec
At #NahamCon2022EU, I shared about an interesting vulnerability in Zoom clients that taught a lot about code review and crafting payloads. Check out the accompanying blogpost at https://spaceraccoon.dev/analyzing-clipboardevent-listeners-stored-xss/ and @nahamsec should share the slides soon!
https://twitter.com/spaceraccoonsec/status/1604137975977164806
I Hope This Sticks: Analyzing ClipboardEvent Listeners for Stored XSS

When is copy-paste payloads not self-XSS? When it’s stored XSS. Recently, I reviewed a Zoom’s code to uncover an interesting attack vector.