Skip to content

Latest commit

 

History

History
94 lines (46 loc) · 4.28 KB

README.md

File metadata and controls

94 lines (46 loc) · 4.28 KB

XSS-DVWA-SOLUTION

Welcome to the DVWA XSS Solutions repository! This repository contains comprehensive solutions for Cross-Site Scripting (XSS) vulnerabilities in the Damn Vulnerable Web Application (DVWA). These solutions are meticulously provided by Nihar Rathod, also known as BugBot19

Overview

The Damn Vulnerable Web Application (DVWA) is a popular web application designed for security professionals and enthusiasts to practice their web security skills in a legal and safe environment. This repository focuses on addressing and mitigating XSS vulnerabilities, one of the most common and critical web security issues.

image

XSS (DOM)

A DOM-based cross-site scripting (XSS) attack happens when a threat actor modifies the document object model (DOM) environment in the victim's browser. So, while the HTML itself doesn't change, the code on the client side executes differently.

LOW

Payload-<script>alert('BugBot19 was here')</script>

image

image

MEDIUM

Payload-<script>alert('BugBot19 was here')</script>

image

image

High

Payload-<script>alert('BugBot19 was here')</script>

image

image

XSS (Reflected)

reflected XSS is a kind of cross-site scripting attack, where malicious script is injected into websites that are trusted or otherwise benign. Typically, the injection occurs when an unsuspecting user clicks on a link that is specifically designed to attack the website they are visiting.

LOW/MEDIUM/HIGH

During the research phase, I found out that one of the payloads can be used in all three levels the payload is mentioned below

Payload-<svg onload=alert('BugBot19 was here')>

image

image

image

image

image

image

XSS (Stored)

Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application. Reflected XSS involves the reflecting of a malicious script off of a web application, onto a user's browser.

Low

Payload - <script>alert(document.domain)</script>

image

image

Medium

Payload - <img src=x onerror=alert(document.cookie)>

Change the text 'size' and 'max length'

image

image

High

Payload - <body onload=alert('Bugbot19')>

Change the text 'size' and 'max length'

image

image