3

I can see in Sentry report that, Along with my vendors~main-6319dfea084cb55e85bf.js,main-6319dfea084cb55e85bf.js and other resource.scripts and resource.css files i can see https://localhost:49506/7pp3ab609c5236b3bf34c2b621ac79ba.js script is been injected and also- GET https://localhost:49506/storage/userId and GET https://localhost:49506/storage/pendingRequests api calls has been triggered.

The attacker tried this from EDGE browser. The application was developed with typescript and Reactjs.

My questions are,

  1. What type of attack it is?
  2. How can i handled this?

Also if any additional info, please post here.

Thanks in advance.

Ela
  • 91
  • 6
  • That port troubled me too, the mqtt was not able to connect by website. So i just found the PID on windows by using "netstat -ano | findstr :49506" and killed it by using "taskkill /PID /F" All worked fine .... – Jainil Patel Oct 13 '22 at 17:09
  • It was something called sj-pulse-proxy-server-app in windows which caused the issues. – Jainil Patel Oct 14 '22 at 14:23

0 Answers0