Twitter.com Hacked Via Text Load Injection by ./BL4CK E4GL3
I found this around 2 AM last night, and it's quite suprising that twitter.com is vulnerable for Text Load Injection . Text load injection is where you're are allowed to inject text from ixData that is an indextable data type. So it will displays message as follow,
{"request":"\/i\/promoted_content\/log.json?BL4CK_E4GL3_W4S_H3RE","error":"Invalid event parameter provided."} We will get that message by visiting the following link:https://twitter.com/i/promoted_content/log.json?BL4CK_E4GL3_W4S_H3RE
I tried to sumbit it on Defacement Mirror like Zone-H, but I can't because someone already sumbitted Twitter.com to that mirror, and it was a FAKE defacement. WTF?
