Léo M. - GrayR0ot
Léo M. - GrayR0ot
I just successfully hijacked a customer Dashboard but if you think it's normal letting this kind of vulnerability this is your choice.
I just solved the issue, there is an ```setAllowPlaceholders(boolean)``` function that is not visible in javadoc/wiki. But it is working
Same problem, but in my case windows 11 not works too: ``` const puppeteer = require('puppeteer-extra') const StealthPlugin = require('puppeteer-extra-plugin-stealth') puppeteer.use(StealthPlugin()) const {executablePath} = require('puppeteer') puppeteer.launch({ executablePath: executablePath(), headless: "new",...
So, actually there is nothing that can bypass UAM ?
Amazing PR :)