Cross-site scripting

Mrunal chawda
2 min readJun 11, 2019

Cross-site Scripting (XSS) challenge

Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code. The web page or web application becomes a vehicle to deliver the malicious script to the user’s browser. Vulnerable vehicles that are commonly used for Cross-site Scripting attacks are forums, message boards, and web pages that allow comments.

A web page or web application is vulnerable to XSS if it uses unsanitized user input in the output that it generates. This user input must then be parsed by the victim’s browser. XSS attacks are possible in VBScript, ActiveX, Flash, and even CSS. However, they are most common in JavaScript, primarily because JavaScript is fundamental to most browsing experiences.

first i found a parameter like name =

and my arguments

name=</script><script>prompt(28)</script>&submit=Search

php?name=%3C/script%3E%3Cscript%3Eprompt(28)%3C/script%3E&submit=Search

my payload and it work

--

--

Mrunal chawda
Mrunal chawda

Written by Mrunal chawda

Blogger | Security Researcher | Digital forensic analyst | Twitter — @mrunal110

No responses yet