diff --git a/XSS.md b/XSS.md index 7f5d3fd..c5a9e16 100644 --- a/XSS.md +++ b/XSS.md @@ -846,6 +846,56 @@ alert("XSS"); ``` +### Polygot +It’s a malicious payload meant to cover all places of reflection (DOM, reflected XSS, stored XSS). Here’s an example by @KNOXSS: + +```javascript +JavaScript://%250A/*?'/*\'/*"/*\"/*`/*\`/*%26apos;)/*\74k + + + + + + +``` + +### Stored XSS on PDF.js CVE-2024–4367 +This particular CVE works on applications that use PDF.js, a PDF viewer. Here’s what you need to do: + +1. Whenever you see an app using this technology, upload a vulnerable PDF file +2. If you see any reflection while opening the file, you’ve got a stored XSS! + +* [PDF Payloads](https://github.com/Mehdi0x90/Web_Hacking/blob/main/XSS-PDF%20Payloads/) + + +### Reflected XSS (Non-Persistent XSS) +**Trick n°1:** + +You go and browse the app normally , make sure to click every button you find ( while burp proxy is on ) , then you go to burp history section and do scoop only select only request with parameter and go to the request one by one and inject your payload on these urls , there a high chance you will find a reflected XSS. + +**Trick n°2:** + +XSS one liner + +```javascript +# method 1 +echo "target.com" | gauplus | grep "?" | qsreplace 'xssz">