Reflected XSS in canonical link tag

  Рет қаралды 4,237

z3nsh3ll

z3nsh3ll

Күн бұрын

Пікірлер: 12
@inezcollabs
@inezcollabs 2 ай бұрын
hey man love your videos i think you're an exceptional teacher, keep up the good work!
@gin767
@gin767 Жыл бұрын
In my case, is there any reason why the canonical link appeared inside double quotes (and not single quotes)? I am using Chromium integrated in BurpSuite. It was confusing until I intercepted the response in Burp and sure enough, there, the href link is shown enclosed in single quotes. Then I proceeded as you did and solved the lab.
@gin767
@gin767 Жыл бұрын
I forgot to add, that double quotes are indeed encoded and I couldn't escape the attribute. That's why it was confusing.
@nishantdalvi9470
@nishantdalvi9470 Жыл бұрын
@@gin767 Hey actually i am little bit perplexed by how the canonical link of the web page is been set dynamically when we simply append the url with the ? and an arbitrary string, Is this kind of behavior comman in the context of web apps and if yes then can you name the term which is related to this functionality ? So that i can study about it in detail
@gin767
@gin767 Жыл бұрын
@@nishantdalvi9470 I don't understand the exact mechanism myself. I just know that it is not normal behaviour in modern browsers and it is due to lack of input validation. PortSwigger did not explain this vulnerability well... just how to exploit it. Maybe MDN network got a better explanation on how canonical links work. Other than that I would guess that this is specific to older versions like IE7, for example. Don't take my word for it though.
@falanavictor1986
@falanavictor1986 5 ай бұрын
@@gin767 i noticed i am facing the same issue , so how did you bypass this please ...i intercepted the request with burp but cant still get it to prompt in real browser
@cristiaaaann
@cristiaaaann Жыл бұрын
Very good explanation, thanks for sharing
@keerthivasan681
@keerthivasan681 Жыл бұрын
Thank you so much for the clear explanation.
@Jonathan-ng4vw
@Jonathan-ng4vw Жыл бұрын
Thanks, please also solve labs from race condition. Your explaination is too good men
@s1k3r4
@s1k3r4 Жыл бұрын
Nice man! 😎 Thanks for sharing ...
@subhasismaity9434
@subhasismaity9434 7 ай бұрын
Please add Hinglish subtitle also !
@leghdaf
@leghdaf 11 ай бұрын
Great Content ...
How is this Website so fast!?
13:39
Wes Bos
Рет қаралды 1,3 МЛН
REAL or FAKE? #beatbox #tiktok
01:03
BeatboxJCOP
Рет қаралды 18 МЛН
Арыстанның айқасы, Тәуіржанның шайқасы!
25:51
QosLike / ҚосЛайк / Косылайық
Рет қаралды 700 М.
Sigma Kid Mistake #funny #sigma
00:17
CRAZY GREAPA
Рет қаралды 30 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
Cross-Site Scripting (XSS) Explained
11:27
PwnFunction
Рет қаралды 467 М.
Generic HTML Sanitizer Bypass Investigation
14:05
LiveOverflow
Рет қаралды 142 М.
Reflected XSS into Template Literal
4:47
z3nsh3ll
Рет қаралды 2,6 М.
Using Custom HTML Tags to Run an XSS Attack
7:56
z3nsh3ll
Рет қаралды 6 М.
PortSwigger Labs - Reflected XSS in canonical link tag
9:33
REAL or FAKE? #beatbox #tiktok
01:03
BeatboxJCOP
Рет қаралды 18 МЛН