← All talks

Chaining Vulnerabilities: Real-World Exploit Showcase #shorts

BSides Frankfurt0:46717 viewsPublished 2026-04Watch on YouTube ↗
About this talk
Discover how chained vulnerabilities like stored XSS, mishandled session cookies, and backend API flaws can lead to sensitive data exfiltration or file deletion. See the real impact. #CyberSecurity #EthicalHacking #Vulnerability #Exploit #XSS
Show transcript [en]

This actually is an exploit we wrote, chaining three of the vulnerabilities. So, we have a stored XSS. We have um session cookies, which are uh not properly handled. And we have an back-end API function, which we can call based on that, which allows us to exfiltrate any data on the file system because there's a path traversal, or we can also delete any file any file on the system. Um We we usually try to implement some exploits that chain things or that show the impact because from our experience, if you just report an XSS, people are are pretty bored. They're like, "Yeah, okay, I'll fix that." But um showing what the impact can be is is usually what what catches the

attention.