OWASP Security Shepherd Project - Cross Site Scripting 3 (XSS Challenge)
Challenge
Solution
Try the 4 examples and the cool stuff we just got <IMG SRC="#" ONSELECT="alert('XSS')"/> from challenge 2.Hmm… the attribute are removed. I get no idea at this point, so I go to search online about XSS.
Fortunately, by checking a thread in StackExchange (https://security.stackexchange.com/questions/120990/bypass-char-filtering-security-shephard , I notice that there is a possibilities web developers use loop to remove key words. As a result, I try to add the attributes several times.
At the end, I'm able to pass the challenge by using <IMG SRC="#" onseleconseleconseleconseleconselecttttt="alert('XSS')"/>.
Reference
StackExchange:https://security.stackexchange.com/questions/120990/bypass-char-filtering-security-shephard
留言
張貼留言
Welcome to share your comments or questions : -)
Enjoy life!