16) Reflected XSS with some SVG markup allowed

Locate possible injection points
As usual the first step is to analyse the application, we have a search functionnality so let's search for random string and then open the developer tools and find where the user input is located in the html

tags are blocked by the application

let's use burp intruder to find all the allowed tags

now let's copy all the tags from the portswigger xss cheat sheet


start attack and click on status to get all the 200 requests

using the portswigger cheat sheet we 've found some xss payloads

but before testing them we have to find allowed events first, using burp intruder again

now let's copy all the events from the portswigger xss cheat sheet


now let's copy all the events from the portswigger xss cheat sheet
now click on start attack

payload :
<svg><animatetransform onbegin=alert(1) attributeName=transform>


and we have solved the lab

Last updated
Was this helpful?