CSP? More Like Can’t Stop Payloads — Bypassing CSP to XSS Like a Pro
作者在周末进行子域名测试时意外发现XSS漏洞,并成功利用该漏洞解决了自己的咖啡瘾。 2025-5-11 02:39:56 Author: infosecwriteups.com(查看原文) 阅读量:7 收藏

Iski

Free Link 🎈

Hey there!😁

Image by Ai

“I only wanted to test some subdomains… but instead, I ended up karate-chopping CSP into submission and walked away with an XSS that paid for my entire caffeine addiction.”

It started like every lazy Sunday: hoodie on, hoodie off, tabs full of Shodan, and a caffeine-fueled terminal session that could fry a data center. I wasn’t even trying to find an XSS.

I was running my usual recon script:

subfinder -d target.com -silent > subs.txt
httpx -l subs.txt -mc 200,403 -title -tech-detect -x GET > live.txt
gau target.com >> all_urls.txt
waybackurls target.com >> all_urls.txt

Then I stumbled upon this juicy endpoint:

https://admin-assets.target.com/config/app.viewer?theme=<user-defined>

At first glance, it screamed: “Hi, I reflect parameters, maybe I’m dangerous, maybe I’m not.” So I poked it.


文章来源: https://infosecwriteups.com/csp-more-like-cant-stop-payloads-bypassing-csp-to-xss-like-a-pro-90d27c2c3a40?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh