xssparams
takes a list of urls and identifies parameters potentially vulnerable to reflected xss
go install github.com/martinvks/xssparams@latest
For information about available flags, run:
xssparams -h
Example usage:
$ cat urls.txt
https://example.com?utm_source=google
https://example.com/articles/1
https://example.com/articles?query=computerphile
https://example.com?referer=https://youtube.com
$ cat urls.txt | xssparams
https://example.com/articles?query=computerphile [{query [SingleQuote]}]
https://example.com?referer=https://youtube.com [{referer [Href]}]
Href
The parameter is reflected in the beggining of an href attributeElement
The parameter is reflected inside an HTML element and the less-than sign is not escapedScript
The parameter is reflected inside a script tag and the</
character sequence is not escapedDoubleQuote
The parameter is reflected inside double quotes and the double quote character is not escapedSingleQuote
The parameter is reflected inside single quotes and the single quote character is not escaped or\'
is escaped as\\'
- Query Parameters, e.g.,
search
andlanguage
inhttps://example.com?search=quantum+computing&language=en
- Numeric path segments, e.g.,
123
inhttps://example.com/articles/123
- UUID path segments, e.g.,
a92d7004-d18e-4aa3-9309-c016b6abca23
inhttps://example.com/articles/a92d7004-d18e-4aa3-9309-c016b6abca23