nuclei-templates/dast/vulnerabilities/xss/reflected-xss.yaml

51 lines
1.1 KiB
YAML

id: reflected-xss
info:
name: Reflected Cross-Site Scripting
author: pdteam,0xKayala,AmirHossein Raeisi
severity: medium
metadata:
max-request: 1
tags: xss,rxss,dast
variables:
first: "{{rand_int(10000, 99999)}}"
http:
- pre-condition:
- type: dsl
dsl:
- 'method == "GET"'
payloads:
reflection:
- "'\"><{{first}}>"
- "'><{{first}}>"
- "\"><{{first}}>"
fuzzing:
- part: query
type: postfix
mode: single
fuzz:
- "{{reflection}}"
- part: path
type: postfix
mode: single
fuzz:
- "{{reflection}}"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "{{reflection}}"
- type: word
part: header
words:
- "text/html"
# digest: 490a004630440220696413c6614ef961424a2b74cbbcb1385b62bc10279e9170fe528b8dc40c23fc0220375e3a090facd6e1d59817f7caacba45f49f7fb7fd450525cfa90ae5d3882649:922c64590222798bb761d5b6d8e72950