XSS and chicken biryani got along.

1 year ago 68
BOOK THIS SPACE FOR AD
ARTICLE AD

Food for thought.

It was wordpress website this time. They had implemented WPE W.A.F to block all xss payloads. No </ , no encoding , no script kiddie stuffs.

One thing I noticed was when I use flower bracket { the application accepts the input. No blocking. Since, the app did not break / sanitize the flower bracket { i was curious to check if its vulnerable for SSTI and CSTI {{7*7}} but no .

I went for lunch break with frustration ordered chicken biryani which costed ₹100. He said no egg, no baingan which led to more frustration. After collecting the plate I looked around and noticed all tables were full. Those pricks who don’t move out of the place even after completing the meal *sighs*. After managing to complete the meal. I came to desk opened the application and reminded of the XSStriker tool which i read long back.

I installed XSStriker tool https://github.com/s0md3v/XSStrike . This is really simple to install and use tool. Follow the instruction.

All you have to do is go to the tool directory cd /yourdirectory/xssstrike

Run python3 xsstrike.py -u example.com/vulnerableparameter and wait for the magic payloads to flash on your screen.

example image

Now copy the vulnerable url and past it in the browser to see the magic xss pop-up.

xss pop-up

Never stop just because some of the payloads gets stopped by WAF. Like everyone says recon is important. Do the information gathering about the target like the web server details, CMS etc which will help you understand the target better. Apart from just Burp suite i always check for tools based out from linux and use browser extensions which will solve the purpose soon .

Read Entire Article