Published 13 years 8 months ago ⢠Last updated April 3, 2025 ⢠â±ï¸ 2 min read â Back to articles This is a very old technique I discovered years ago which I used to bypass a filter and it's pretty awesome. It might come in handy to bypass a WAF or filter since it's not public until now. First you need to understand (which you probably do) that the window object is the default object in JavaScript a
ã¯ããã« Writeup Case 01: Simple XSS 1 è§£ç Case 02: Simple XSS 2 è§£ç Case 03: With htmlspecialchars() è§£ç Case 04-1: Without any backquotes and HTML tags è§£ç Case 04-2: Without any backquotes, HTML tags and [ux] è§£ç Case 05: Without any alphabets è§£ç Case 06-1: Without any paretheses è§£ç Case 06-2: Without any parentheses and [oO][nN] è§£ç Case 06-3: Without any paretheses and .[oO].[nN].* è§£ç Case 06-4: Withou
XXE#Valid use case#This is a non-malicious example of how external entities are used: <?xml version="1.0" standalone="no" ?> <!DOCTYPE copyright [ <!ELEMENT copyright (#PCDATA)> <!ENTITY c SYSTEM "http://www.xmlwriter.net/copyright.xml"> ]> <copyright>&c;</copyright> Resource: https://xmlwriter.net/xml_guide/entity_declaration.shtml Testing methodology#Once youâve intercepted the POST to the vulne
Introduction ãã㯠ã»ãã¥ãªãã£ã»ãããã£ã³ã in 岡山 2018 ã§æ¼ç¿ã³ã³ãã³ãã¨ãã¦ä½¿ç¨ããã, *åå¦è åã* ã® XSS Challenge ã§ãã alert('XSS') 㨠alert(document.domain) ã® 2 ã¤ã, åãã¼ã¸ã§å®è¡ãã¦ãã ããããã ã document.domain == xss.shift-js.info ã¨ãªãããã«ãã¾ããããç¹æ®µã®æç¤ºããªãéã, å¤ãã®åé¡ã§ã¯, ã¦ã¼ã¶ã¼æä½ãå¿ è¦ã¨ãããã®(e.g. onclick)ã§ãæ§ãã¾ããã CTF ã¨éã, ç¹ã« alert ãçãã¦ã FLAG ã表示ãããããã¾ããã, alert('XSS') 㨠alert(document.domain) ãæ£ããå®è¡ãããã¨, "You win! :-)" ã¨ã ã表示ããã¾ããalert ãåºãã¦æ¥½ãã¿ã¾ããããã¾ã pu
ããã«ã¡ã¯ãã»ãã¥ãªãã£ã¨ã³ã¸ãã¢ã®koboã§ãããã¯ã·ãã§ã¯2016å¹´ããèå¼±æ§å ±å¥¨éå¶åº¦ãéç¨ãã¦ãã¾ããã2018年度ã«å ¥ã£ã¦ããå ±å¥¨éã®å¢é¡ãæ°ãããã©ãããã©ã¼ã ã¸ã®åå ¥ãªã©ãããã¾ã§ã«å¢ãã¦æ³¨åãã¦ãã¾ããæ¬è¨äºã§ã¯ãæè¿ã®ãã¯ã·ãã®èå¼±æ§å ±å¥¨éå¶åº¦ã®ååã¨å®éã«å ±åãããèå¼±æ§ã®ä¾ãç´¹ä»ãã¦ããã¾ãã pixiv Bug Bounty Programã®æ¦è¦ æé: 2016/04ã æ¯æãæ¸ã¿å ±å¥¨éç·é¡: 300ä¸åç¨åº¦ å ±åç·æ°: 294ä»¶ ãã¯ã·ãã§ã¯2å¹´åã»ã©ã«æ¸¡ã£ã¦èå¼±æ§å ±å¥¨éå¶åº¦ã宿½ãã¦ãã¾ãããã2018å¹´ã«å ¥ã£ã¦ããèå¼±æ§å ±åã®ä»¶æ°ãã¯ãªãªãã£åä¸ã®çºã«2ã¤ã®éè¦ãªå¤æ´ãè¡ãã¾ããã å ±å¥¨éã®å¢é¡ èå¼±æ§ãå ±åããããã«ã¼ã«å¯¾ãã¦ããã¾ã§ãããé«ãã¤ã³ã»ã³ãã£ããæä¾ãããã¨ã§å ±åãä¿ããã HackerOneã¸ã®åå ¥ ä¸çæå¤§ã®ãã°ãã¦ã³ãã£ãã©ãããã©ã¼ã
Chrome 61ãã使ããããã«ãªã£ãWebUSB APIã使ã£ã¦USBããã¤ã¹ã¨ä¼è©±ããæ¹æ³ã解説ãã¾ãã ããã¯2017å¹´12æ13æ¥ã«è¡ããã Shibuya.XSS techtalk #10 ã®çºè¡¨è³æã§ãã ããã¯2017å¹´9æ23æ¥ã«è¡ããã 第3å ã«ã¼ãã«ï¼VMæ¢æ¤é@åé¸ã§ã®çºâ¦
æ¬è¨äºã¯ImageMagické¢é£ã®è¨äºã®3æ¬ç®ã§ããImageMagickã®æ¢ç¥ã®èå¼±æ§ãã·ã¹ãã æ å ±ã®æ¼æ´©ãªã©ã®åé¡ãæ±ã£ã1ã¤ç®ã®è¨äºãDoSãæ±ã£ã2ã¤ç®ã®è¨äºãåç §ãã ããã æçµã¨ãªã3åç®ã®ä»åã¯ãXSSã¨ã¢ã¯ã»ã¹å¶å¾¡ãåãä¸ãã¾ããåæã¨ããç°å¢ãªã©ã¯ååã»åã åã¨åãã§ãã â» è¨äºä¸ã§ã¯å³ã®ç¥èªã使ã£ã¦ãã¾ãã IM = ImageMagickãCW = CarrierWave ã¢ã¯ã»ã¹å¶å¾¡ã®ä¸å ååã®è¨äºã§è¿°ã¹ãããã«ãããã©ã«ãã®ç¶æ ã®CWã¯å ¬éãã£ã¬ã¯ããªã«ã¢ãããã¼ãããããã¡ã¤ã«ãç½®ãã¾ãããã¡ã¤ã«ã®æçµçãªä¿ååã«ä¸æçã«ä½æããããã£ãã·ã¥ãåæ§ã§ãã ãããã®ãã¡ã¤ã«ã¯URLãæ¨æ¸¬ã§ããã°èª°ã§ãåç §å¯è½ã§ãã
ä¸ç¹å®ã®ã¦ã¼ã¶ã¼ãå ¥åããMarkdownããã©ã¦ã¶ä¸ã§JavaScriptã使ã£ã¦HTMLã«å¤æããã¨ããå ´é¢ã«ããã¦ã¯ãJavaScriptã§å¤æãã¦HTMLãçæããã¨ããå¦çã®é½åä¸ã©ããã¦ãDOM-based XSSã®çºçãèããªãããã«ã¯ãããªãããã¨ãã£ã¦ãMarkdownããã¼ã¹ãHTMLãçæããã¨ããå¦çãã¹ã¦ãXSSãåå¨ããªãããã«æ³¨æããªããèªåã§æ¸ãã®ã大å¤ã ããmarkedãmarkdown-jsãªã©ã®æ¢åã®å¤æç¨ã®JSãæã£ã¦ãã¦ãããããXSSããªããã確èªããã®ã¯çµæ§å¤§å¤ã ã£ããããã ãããã£ãå ´åã«ã¯ãMarkdownããçæãããHTMLãRickDOMãéããã¨ã§ãä¸ãä¸HTMLå ã«JavaScriptãå«ã¾ãã¦ããã¨ãã¦ãããããé¤å¤ãã許å¯ãããè¦ç´ ã許å¯ããã屿§ã ãã§æ§ç¯ãããå®å ¨ãªHTMLã«åæ§ç¯ãããã¨ãã§ãããããã«ããããã£ã¦çæ
ã¯ããã« ã¯ããã¾ãã¦ãç¦å²¡ãªãã£ã¹ã§åãã¦ããåå¹³ã§ãã ã»ãã¥ã¢ã¹ã«ã¤ã»ãã¯ããã¸ã¼ã§ã¯ããã§ã«ããã¤ãã®ã«ãã´ãªã®ããã°ãçºä¿¡ãã¦ãã¾ãããæè¡ãæ°è»½ã«çºä¿¡ããããã¨ã³ã¸ãã¢ãæ®æ®µã®æ¥åã§ã©ã®ãããªæè¡ã«è§¦ãã¦ããã®ããç´¹ä»ããããããã¨ãç®çã¨ãã¦ãæ°ãããã¨ã³ã¸ãã¢ããã°ããç«ã¡ä¸ããã¾ããã æ¬è¨äºã§ã¯ãæè¿ã«ãªã£ã¦ãããã (æ±) æ¤è¨¼ãã Vue.js ã§ã®ã¯ãã¹ãµã¤ãã»ã¹ã¯ãªããã£ã³ã° (XSS) ã«ã¤ãã¦ç´¹ä»ãã¾ãã ãªããæ¬è¨äºã®å 容ã¯ç§è¦ã«åºã¥ããã®ã§ãããæå±çµç¹ã代表ãããã®ã§ã¯ããã¾ããã åæ æ¬è¨äºã§ã¯ Vue.js ã使ã£ã¦ XSS ã®èå¼±æ§ãä½ã£ã¦ãã¾ããããªã±ã¼ã¹ã説æãã¾ããããã®ä»ã® JavaScript ã®ã©ã¤ãã©ãª/ãã¬ã¼ã ã¯ã¼ã¯ã使ã£ãå ´åã§ãåæ§ã®ãªã¹ã¯ãããå¯è½æ§ãããã¾ãã æ¤è¨¼ã§å©ç¨ãããã¼ã¸ã§ã³ Vue.js v2.5.16 (ãµ
A few months ago, I used Google Maps. Or maybe Google Street View, I love Street View, itâs like a retrofuturistic way to teleport. Routinely, I looked at the address bar. Since sometime in 2014, parameters are not the mere query string they used to be. Instead, itâs a weird mash of alphanumeric characters separated by exclamation points. Itâs abstruse, it has no public documentation whatsoever, i
English version is here: https://mksben.l0.cm/2018/05/cve-2018-5175-firefox-csp-strict-dynamic-bypass.html Firefox 60ã§ä¿®æ£ãããContent Security Policy(CSP)ã®strict-dynamicããã¤ãã¹ã§ããèå¼±æ§ã«ã¤ãã¦æ¸ãã¾ãã https://www.mozilla.org/en-US/security/advisories/mfsa2018-11/#CVE-2018-5175 A mechanism to bypass Content Security Policy (CSP) protections on sites that have a script-src policy of 'strict-dynamic'. If a target
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãç¥ãã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}