TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: XSS on the new Minecraft.net website

2 pointsby _jomoabout 9 years ago

1 comment

_jomoabout 9 years ago
The issue was quite serious because it was possible to remotely log out a user (via GET) and because the javascript executed when email&#x2F;password were still in the login form.<p>I also wonder how well known it is that &#x27;window.location.href&#x27; accepts &#x27;javascript:...&#x27; URIs which are then executed.<p>Why do browsers even allow this? Are there any legitimate use cases?