3) DOM XSS in document.write sink using source location.search
Previous2) Stored XSS into HTML context with nothing encodedNext4) DOM XSS in innerHTML sink using source location.search
Last updated
Was this helpful?
Last updated
Was this helpful?
the search term is included on the result page.
A simple XSS attempt fails:
it shows that a javascript takes the search term out of the URL and writes it into an img-tag for some type of tracking:
Using the browser tools, I can inspect the resulting HTML. It is visible that my search term is embedded without any apparent safeguards:
Of course, the script tags are within a string here, so they are harmless. However, if I can terminate the string by injecting double quotes, then I can manipulate the resulting HTML freely.
Injecting "><script>alert(1)</script>
results in the following HTML:
and we have solved the lab