<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Cookie Tossing on kazama.in</title>
    <link>https://kazama.in/tags/cookie-tossing/</link>
    <description>Recent content in Cookie Tossing on kazama.in</description>
    <generator>Hugo -- 0.118.2</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 06 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://kazama.in/tags/cookie-tossing/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Making Self-XSS Great Again: Unauthorized Access Request Approvals in Cloudflare</title>
      <link>https://kazama.in/self-xss-to-cloudflare-single-click-approvals/</link>
      <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://kazama.in/self-xss-to-cloudflare-single-click-approvals/</guid>
      <description>You know, that vulnerability class that triagers love to close as &amp;ldquo;informative&amp;rdquo; faster than you can type &amp;ldquo;but wait, there&amp;rsquo;s a chain.&amp;rdquo; I took three bugs that would each get laughed out of a triage queue &amp;ndash; a Self-XSS nobody can reach, a Cookie Tossing that does nothing, and a predictable CSRF token with no delivery mechanism &amp;ndash; and duct-taped them into a single-click bypass of Cloudflare Access&amp;rsquo;s Temporary Auth approval flow.</description>
    </item>
  </channel>
</rss>
