From 7517161d89b32479089a865d2b528403db6c5d7e Mon Sep 17 00:00:00 2001 From: CPol Date: Thu, 25 Feb 2021 11:06:26 +0000 Subject: [PATCH] GitBook: [master] one page modified --- pentesting-web/xss-cross-site-scripting/README.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/pentesting-web/xss-cross-site-scripting/README.md b/pentesting-web/xss-cross-site-scripting/README.md index 9b6054b3..a9f5aedc 100644 --- a/pentesting-web/xss-cross-site-scripting/README.md +++ b/pentesting-web/xss-cross-site-scripting/README.md @@ -190,6 +190,18 @@ If you **cannot escape from the tag**, you could create new attributes inside th " autofocus onfocus=alert(document.domain) x=" ``` +#### Style events + +```python +

XSS

+

XSS

+ +#ayload that injects an invisible overlay that will trigger a payload if anywhere on the page is clicked: +
+#moving your mouse anywhere over the page (0-click-ish): +
+``` + ### Within the attribute Even if you **cannot escape from the attribute** \(`"` is being encoded or deleted\), depending on **which attribute** your value is being reflected in **if you control all the value or just a part** you will be able to abuse it. For **example**, if you control an event like `onclick=` you will be able to make it execute arbitrary code when it's clicked.