CSP? More Like Can’t Stop Payloads — Bypassing CSP to XSS Like a Pro
作者在测试子域名时意外发现了一个CSP绕过和XSS漏洞。通过使用subfinder、httpx等工具进行安全测试,最终发现了一个返回参数的端点,并成功利用该漏洞。 2025-5-11 02:39:56 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Iski

Free Link 🎈

Hey there!😁

Image by Ai

“I only wanted to test some subdomains… but instead, I ended up karate-chopping CSP into submission and walked away with an XSS that paid for my entire caffeine addiction.”

It started like every lazy Sunday: hoodie on, hoodie off, tabs full of Shodan, and a caffeine-fueled terminal session that could fry a data center. I wasn’t even trying to find an XSS.

I was running my usual recon script:

subfinder -d target.com -silent > subs.txt
httpx -l subs.txt -mc 200,403 -title -tech-detect -x GET > live.txt
gau target.com >> all_urls.txt
waybackurls target.com >> all_urls.txt

Then I stumbled upon this juicy endpoint:

https://admin-assets.target.com/config/app.viewer?theme=<user-defined>

At first glance, it screamed: “Hi, I reflect parameters, maybe I’m dangerous, maybe I’m not.” So I poked it.


文章来源: https://infosecwriteups.com/csp-more-like-cant-stop-payloads-bypassing-csp-to-xss-like-a-pro-90d27c2c3a40?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh