OWASP Security Shepherd Project - Cross Site Scripting 3 (XSS Challenge)

Challenge


Solution

    Try the 4 examples and the cool stuff we just got <IMG SRC="#" ONSELECT="alert('XSS')"/> from challenge 2.

    Hmm… the attribute are removed.
I get no idea at this point, so I go to search online about XSS.
    Fortunately, by checking a thread in StackExchange (https://security.stackexchange.com/questions/120990/bypass-char-filtering-security-shephard , I notice that there is a possibilities web developers use loop to remove key words. As a result, I try to add the attributes several times.
    At the end, I'm able to pass the challenge by using <IMG SRC="#" onseleconseleconseleconseleconselecttttt="alert('XSS')"/>

Reference

StackExchange: 
https://security.stackexchange.com/questions/120990/bypass-char-filtering-security-shephard



留言

The Hottest Articles

OWASP Security Shepherd Project - My Practice & Solutions

OSCP回顧 & 準備建議

OWASP Security Shepherd Project - SQL Injection 3 (Injection Challenge)