Reflected
Last updated
Last updated
Set a global accessKey parameter. When the user presses the selected key, a script will be executed. Works only on Chrome
Anchor href parameter poisoning
Find vulnerable field
Send request to Burp Intruder as following <§[payload]§>
to find unfiltered tags
Set the payload to a list of tags (see ) and start the attack
After finding an unfiltered tag set the payload to <[tag]+§[payload]§="alert()">
Set the payload to a list of events (see ) and start the attack
After finding a suitable event the basic payload will be<[tag]+[event]="[js]">
Deliver through IFrame
Deliver with custom tag with autofocus
Escape from string such as var x = 'input'
Escape from strings with angled brackets encoded
Evade filters
JS template strings are declared between backticks and use ${...}
notation to evaluate code and inject the result in the string.
To execute code simply inject ${<...>}
in the string
Sandbox escape by owerwriting the charAt method to join characters instead of evaluoating them one at a time
Code execution payloads
Content Security Policy Bypass