character-encoding

4 articles
sort: new top best
clear filter
0 6/10

SSRF vulnerability in a PDF generator where HTML filters on the web app were bypassed by inserting payloads via mobile app and using forward-slash character encoding in iframe tags to access internal resources like error logs (elmah.axd).

John Michael Mondilla elmah.axd
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 6 hours ago · details
0 7/10

A stored XSS vulnerability in InternShala.com exploited through a JSON endpoint with incorrect text/html content-type header. The attacker bypassed multiple filters (whitespace, forward slashes, alert/prompt functions, parentheses, angle brackets) using character substitution and URL encoding to inject a working XSS payload via the current_city_administrative_area_level_2 parameter.

InternShala.com Noman Shaikh
bugbaba.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 6 hours ago · details
0 5/10

Demonstrates a practical XSS defacement technique using HTML injection and character encoding obfuscation via String.fromCharCode() to bypass simple filters and inject full-page HTML replacements.

Uncle Jim's Javascript Utilities Arif-ITSEC111 String.fromCharCode
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 6 hours ago · details
0 7/10

A detailed writeup demonstrating how to bypass uppercase character filtering in JavaScript-based XSS vulnerabilities using JSFuck-style obfuscation to construct payloads without forbidden characters, escalating from PoC alert(1) to arbitrary code execution via dynamic script loading.

JsFuck Martin Kleppe HackerOne WordPress Chrome Burp Suite
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 6 hours ago · details