I found an XSS in example.com website, however i’m not able to make it work as there’s a filter in place. The filter throws a 403 error when i insert common xss payloads. It also blocks the following
<script> tags are blocked
alert, prompt, confirm & write are blocked
every valid Window Event Attributes are blocked
Closed tags are blocked, for example <a href="1" works while <a href="1">a is removed
I was able to inject the following payload
<test/onxsstest="console.log(1111)"
but obviously this code doesn’t works as onxsstest doesn’t exist.
What payloads can i use to bypass this xss filter?
See if you can get a <table>, <input>, or <img> in there - if you can, its definitely interpolating your input. If you can get a <img> in there, you can try the src attribute:
" <img src=">x" <!-- /"
src="javascript:throw new Error();"
or see if it will let you load from base64 data: schemes. There’s some payloads floating around out there for xml/svg that will execute javascript.