Report of XSS-1
Report of XSS-1
1. Reflected XSS
2. Reflected XSS
Explanation of Payload:
o "><img src=x starts a new HTML tag and attempts to load an image.
o onerror=alert(document.domain) means that if the image fails to load
(which it will), it will trigger an alert showing the current domain.
Steps:
• Go to https://app.mopub.com/reports/custom/.
• Click on New network report.
• In the name field, enter the payload: "><img src=x
onerror=alert(document.domain)>.
• Click Run and save; the XSS will trigger when the report is accessed
6. Stored XSS
• The attacker changes a member's name to include harmful code. When an admin
looks at the activity log, this code runs and shows a popup, which can let the
attacker steal the admin's cookies.
• hunter"><svg/onload=alert(2)>
• hunter": This part ends a name field, allowing the next part to be added.
• <svg/onload=alert(2)>: This creates a small image that shows a popup saying
"2" when the page loads.
• https://hackerone.com/reports/391390
7. Stored XSS
• The harmful code is submitted by the attacker and stored on the victim's blog.
When the victim later edits the post, the stored code executes in their browser. This
type of XSS persists because it remains on the server and affects users who interact
with that content later.
• Submit a Post: The attacker goes to the victim's blog and creates a post with a link
that contains harmful code (like javascript://x.com%0aalert(1);).
• Victim Edits Post: When the victim checks their inbox and edits that post, they
click a link that runs the harmful code.
• Triggering the XSS: This code will then execute, showing an alert with the victim's
domain, proving that the attack worked
• javascript://: This tells the browser to run JavaScript instead of going to a web
page.
• x.com: This part is just a fake website name; it doesn’t really do anything here.
• %0a: This is a way to create a line break in the code.
• alert(1);: This is the actual command that pops up a message box showing the
number "1."
• https://hackerone.com/reports/949382
8. Reflected XSS
• When a user clicks this link, if the website doesn't check the input properly, it will
run the harmful JavaScript code in the user's browser. This shows that the attack
worked and could allow the attacker to do more bad things, like steal cookies or
personal information.
• URL- https://panther.com/search/test<svg on onload=(alert)(document.domain)>
• Payload -test<svg on onload=(alert)(document.domain)>
• <svg> Element: The payload injects an SVG image tag.
• onload Attribute: When the SVG is loaded, it triggers the JavaScript code.
• alert(document.domain): This code shows an alert box displaying the current
domain, which proves the XSS worked
• URL-
https://www.starbucks.com/account/signin?ReturnUrl=%19Jav%09asc%09ript%3
ahttps%20%3a%2f%2fwww%2estarbucks%2ecom%2f%250Aalert%2528documen
t.domain%2529
• Payload- 19JavaScript:https://www.starbucks.com/alert(document.domain)
• 19JavaScript:: This is extra text that confuses the website into thinking it’s safe.
• https://www.starbucks.com/: This is just a regular website link.
• alert(document.domain): This part makes a popup appear that shows the name
of the website you're on.
• https://hackerone.com/reports/438240
• URL-
https://exchangemarketplace.com/blogsearch?q=OnMoUsEoVeR=prompt(/hacked
/)//
• https://exchangemarketplace.com/blogsearch: This is the search page.
• q=: This part is for the search term.
• OnMoUsEoVeR=prompt(/hacked/): This is the harmful code that will run
• https://hackerone.com/reports/1145162
11. Stored XSS
• Payload-javascript:alert(1)//https://dqdqdqdqdq.myshopify.com
• javascript::
• This part tells the browser to run some JavaScript code.
• alert(1):
• This is the code that creates a popup that shows the number 1.
• //:
• This means that anything after it is ignored, so the URL doesn’t affect the code.
• https://dqdqdqdqdq.myshopify.com:
• This is a website link, but it’s just ignored because of the //.
• https://hackerone.com/reports/756729
• Self-XSS:
• Occurs when a user runs harmful code in their own browser.
• The user is tricked into executing the code they input themselves.
• Payload Explanation:
• The payload ("><img src=xx onerror=alert(document.domain)>) creates an
image tag.
• If the image fails to load, it triggers an alert showing the website's domain.
• User Action:
• The vulnerability relies on the user uploading a file with malicious code.
• This affects only the user who performs the action, not other users.
• https://hackerone.com/reports/982510