UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑𝐗𝐒𝐒 𝐓𝐡𝐫𝐨𝐮𝐠𝐡 𝐇𝐑𝐄𝐅 𝐔𝐑𝐋𝐬 👇

I often see applications that let their users control URLs which are reflected back in the DOM as part of the HREF tag

Most of the time these features let you:

• set the integration URL with a 3rd party service
• customize your profile page with a link to your own blog/website
• link your account to you social media profile

While sometimes developers use HTML encoding on quotes to block attackers from escaping the tag, there are several ways to trigger XSS inside href tags <without> escaping them.

One of them is to provide a valid URL format (to bypass server-side validation) but use the javascript protocol (instead of http which is what most developers would expect)

Note however that this won't work if the target="_blank" is specified

Ref: Andrei Agape
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)