From ccb02d5bfafbd6b0b9f73cd4121c64757d3b28f0 Mon Sep 17 00:00:00 2001 From: Mehdi Date: Tue, 27 Aug 2024 07:07:47 +0330 Subject: [PATCH] Update XSS.md --- XSS.md | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 51 insertions(+) diff --git a/XSS.md b/XSS.md index 7f5d3fd..c5a9e16 100644 --- a/XSS.md +++ b/XSS.md @@ -846,6 +846,56 @@ alert("XSS"); ``` +### Polygot +It’s a malicious payload meant to cover all places of reflection (DOM, reflected XSS, stored XSS). Here’s an example by @KNOXSS: + +```javascript +JavaScript://%250A/*?'/*\'/*"/*\"/*`/*\`/*%26apos;)/*\74k + + + + + + +``` + +### Stored XSS on PDF.js CVE-2024–4367 +This particular CVE works on applications that use PDF.js, a PDF viewer. Here’s what you need to do: + +1. Whenever you see an app using this technology, upload a vulnerable PDF file +2. If you see any reflection while opening the file, you’ve got a stored XSS! + +* [PDF Payloads](https://github.com/Mehdi0x90/Web_Hacking/blob/main/XSS-PDF%20Payloads/) + + +### Reflected XSS (Non-Persistent XSS) +**Trick n°1:** + +You go and browse the app normally , make sure to click every button you find ( while burp proxy is on ) , then you go to burp history section and do scoop only select only request with parameter and go to the request one by one and inject your payload on these urls , there a high chance you will find a reflected XSS. + +**Trick n°2:** + +XSS one liner + +```javascript +# method 1 +echo "target.com" | gauplus | grep "?" | qsreplace 'xssz">