CrossCoalesce UXSS

HTTP/2 ORIGIN Frame Connection Coalescing Attack — Firefox

Attacker origin:
ORIGIN frame sent for: https://satytest.xyz
Certificate: Let's Encrypt (publicly trusted)
Browser:
How this works:
1. You connected to https://satytestattack.xyz via HTTP/2
2. The server sent an ORIGIN frame claiming authority for satytest.xyz
3. Firefox will reuse this connection for satytest.xyz requests
4. The iframe below loads https://satytest.xyz — but this server answers
5. Arbitrary JavaScript executes in the satytest.xyz origin