Blind XSS : a mind Game
quality 6/10 · good
0 net
AI Summary
A researcher exploited a blind XSS vulnerability in a backend portal by iteratively bypassing WAF filters through payload modification, ultimately achieving code execution and cookie exfiltration using an img tag with onload handler that extracts document.cookie to a logging endpoint.
Tags
Entities
blindf.com
Dirtycoder
Blind Xss (A mind game to win the battle) | by Dirtycoder - Freedium
Milestone: 20GB Reached
We’ve reached 20GB of stored data — thank you for helping us grow!
Patreon
Ko-fi
Liberapay
Close
< Go to the original
Blind Xss (A mind game to win the battle)
In this write-up, I will explain how I exploited a blind XSS in the backend portal of a program.
Dirtycoder
Follow
~2 min read
·
December 11, 2019 (Updated: December 12, 2021)
·
Free: Yes
I will not take much time and keep the write-up simple and point to point.
It was a private program so we will call it https://redacted.com.
I used https://blindf.com in order to exploit it. It's a platform/tool/framework to find blind XSS.
Attack Starts:
Found a form on https://redacted.com
I put Bhtml payload + BXSS payload in the text field
Payload:
">
Result: WAF stopped me to submit the form.
3. I removed the BXSS payload. Now the payload was
Payload:
Result: WAF did not stop me and I successfully submitted the form. Next day Blindf confirmed the BHTML payload execution in the backend. Now It's time to submit the Bxss payload. Because I knew that the backend portal is vulnerable and I just have to submit the Bxss payload.
4. Next Payload used. BHTML + BXSS
Payload:
">