the returned page, you can inject the following 46-byte script, which evaluates
the fragment string in the current URL:
By injecting this script into the parameter that is vulnerable to reflected XSS,
you can effectively induce a DOM-based XSS vulnerability in the resulting
page and thus execute a second script located within the fragment string,
which is outside the control of the application’s filters and may be arbitrarily
long. For example:
https://wahh-app.com/error.php?message=
#alert(‘long script
here ......’)
Do'stlaringiz bilan baham: