You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
HTML, XML and SVG can be uploaded and displayed directly in the page, opening the website to XSS attacks.
CSP are set to block inline script execution but it can be easily bypass by uploading a JS file and then include it inside the HTML, XML or SVG document, CSP should not be trusted to prevent XSS attacks.
These files should be displayed as plain text or forced to download when opening their urls.
Examples
First we upload the JS file, it will give us the url https://u.teknik.io/c9X1t.js
HTML, XML and SVG can be uploaded and displayed directly in the page, opening the website to XSS attacks.
CSP are set to block inline script execution but it can be easily bypass by uploading a JS file and then include it inside the HTML, XML or SVG document, CSP should not be trusted to prevent XSS attacks.
These files should be displayed as plain text or forced to download when opening their urls.
Examples
Using HTML
Using XML
Using SVG
The text was updated successfully, but these errors were encountered: