16) Reflected XSS with some SVG markup allowed
Previous15) Reflected XSS into HTML context with all tags blocked except custom onesNext17) Reflected XSS in canonical link tag
Last updated
Was this helpful?
Last updated
Was this helpful?
As usual the first step is to analyse the application, we have a search functionnality so let's search for random string and then open the developer tools and find where the user input is located in the html
tags are blocked by the application
let's use burp intruder to find all the allowed tags
start attack and click on status to get all the 200 requests
using the portswigger cheat sheet we 've found some xss payloads
but before testing them we have to find allowed events first, using burp intruder again
now click on start attack
and we have solved the lab
now let's copy all the tags from the
now let's copy all the events from the
now let's copy all the events from the