Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Alternative Ways to get past Entity Blocking (XSS)


RuneArt's Avatar
Member
0 0

Many websites simply remove HTML entities from your search.

For example this websites does:

Adds a / before " or '

This would mean if you typed alert("hey") it would get changed to alert(/"hey/")

How could one get past this?

(Encoding the HTML Entities does not work)


Futility's Avatar
:(
80 122

It looks like what you're dealing with (at least from an outward perspective, who knows exactly how it's being implemented), is a call to the PHP function addslashes(). I would suggest reading up on bypasses for that particular call, as there are many generic XSS payloads that can do it.

Now to be clear, that's just from a preliminary look at a single set of outputs. Generally speaking, one would have to observe a much larger number of requests/responses to get a feel for what the filter is actually doing before making a guess with any strong merit. There are rarely one-size-fits-all payloads in the modern age of injection, so copy/pasting from random sites is unlikely to yield any strong results.


Huitzilopochtli's Avatar
....
10 9

You're always better off using numbers when you're looking for XSS vulnerabilities, as they don't need to be wrapped in single or double  quotes, so you wouldn't accidently trip any filters that were intended to prevent sql injection.

You said encoding HTML Entities doesn't work, have you tried double encoding it, or even using backticks?

If it's sent via POST check to see if it can also be sent as a GET  as the filters are often different for data sent via the url.

Failing that, you should make a list of any special chars that do pass the filters, then you'll know what you have to work with.