Proof-of-concept: Stealing private channel auth tokens via JSONP on /broadcasting/auth
/broadcasting/auth endpoint accepts GET requests with a callback parameter,
returning a JSONP response that can be loaded cross-origin via a <script> tag.
With SameSite=Lax (default), this attack is blocked cross-origin in modern browsers.
It succeeds when: same-site subdomains, SameSite=None, or older browsers.
<script> tag targeting /broadcasting/auth?callback=...&socket_id=....
If the victim's session cookie is sent, the server returns a JSONP response with the HMAC auth signature.
pusher:subscribe message over the WebSocket using the stolen auth token
to join the private channel without authorization.