The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

DOM XSS in jQuery selector sink using a hashchange event exploit servernot working

I solved this challenge successfully, the XSS triggers everytime i click view exploit, however when i send it to the victim it doesnt do anything,and its still not marked as a solved challenge, this is my exploit: <iframe...

Last updated: Oct 28, 2024 09:40AM UTC | 1 Agent replies | 0 Community replies | Bug Reports

Victim not visiting the pages on several labs

Dear support, The labs Exploiting cross-site scripting to steal cookies and Exploiting cross-site scripting to capture passwords are not working properly right now. Not only does it take a lot of time to launch the...

Last updated: Oct 28, 2024 08:31AM UTC | 1 Agent replies | 1 Community replies | Bug Reports

unknown host error

please tell solution . when i browse and intercept and request is forward then error show is unknown host

Last updated: Oct 26, 2024 01:48AM UTC | 13 Agent replies | 17 Community replies | Bug Reports

Update Blocked

Whenever I run Burp Suite Professional and either choose an existing project or create a new I get the following error Update blocked An update is available, but we are unable to install it because your Burp Suite...

Last updated: Oct 25, 2024 03:35AM UTC | 1 Agent replies | 1 Community replies | Bug Reports

OAuth account hijacking via redirect_uri

I am working on the following lab: https://portswigger.net/web-security/oauth/lab-oauth-account-hijacking-via-redirect-uri I have followed the solution instructions. PoC: <iframe...

Last updated: Oct 24, 2024 12:01PM UTC | 2 Agent replies | 3 Community replies | Bug Reports

Lab: CORS vulnerability with basic origin reflection not working

In this lab, I'm stuck on step 5 of the solution: In the browser, go to the exploit server and enter the following HTML, replacing YOUR-LAB-ID with your unique lab URL: <script> var req = new XMLHttpRequest(); ...

Last updated: Oct 24, 2024 10:48AM UTC | 21 Agent replies | 32 Community replies | Bug Reports

Unable to quit Burp after undocking Proxy tab

I detached the Proxy tab and quit Burp and it saved that way. I want to change it back ... now if I re-attach the tab or use view -> restore default tab layout and try to quit, nothing happens. If I force quit, the tab...

Last updated: Oct 23, 2024 09:25PM UTC | 1 Agent replies | 2 Community replies | Bug Reports

not all labs are solving

Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded not solving. and Lab: Basic clickjacking with CSRF token protection even i tried the lab solutions.

Last updated: Oct 22, 2024 07:50AM UTC | 1 Agent replies | 0 Community replies | Bug Reports

Lab: Reflected XSS protected by very strict CSP, with dangling markup attack

Hi! I'd just like a confirmation whether this lab is still solvable. I'm using the suggested solution script with my own server IDs: <script> if(window.name) { new...

Last updated: Oct 21, 2024 05:10PM UTC | 1 Agent replies | 1 Community replies | Bug Reports

Issues on the proposed solution to Lab: OAuth account hijacking via redirect_uri

We tried to solve https://portswigger.net/web-security/oauth/lab-oauth-account-hijacking-via-redirect-uri using the proposed solution. In particular, to steal the authorization code, such solution specifies to have the...

Last updated: Oct 21, 2024 12:10PM UTC | 11 Agent replies | 12 Community replies | Bug Reports

solved lab is showing not solved

i've succesfully sovled the lab Method-based access control can be circumvented but it shows that i dint solve it when i am redirected to the homepage

Last updated: Oct 21, 2024 10:38AM UTC | 31 Agent replies | 65 Community replies | Bug Reports

CSRF Labs Broken?

Hi, Is it possible the CSRF labs are broken? I have attempted the following: - https://portswigger.net/web-security/csrf/lab-no-defenses -...

Last updated: Oct 21, 2024 10:36AM UTC | 4 Agent replies | 7 Community replies | Bug Reports

collaborator dns changed to oastify.com ?

has been mail collaborator switched to use oastify.com domain ? version: Professional v2202.3.9 build 13363 bodik

Last updated: Oct 21, 2024 09:53AM UTC | 6 Agent replies | 8 Community replies | Bug Reports

Disappearance of the 'Proxy' Tab

Hello, I'm having trouble locating the 'Proxy' tab, which is hindering my ability to intercept requests. Attached are relevant screenshots for...

Last updated: Oct 20, 2024 07:48PM UTC | 1 Agent replies | 3 Community replies | Bug Reports

burp browser does not open in ubuntu 24.04

I recently upgraded my system to ubuntu 24.04 lts (previously it was 22.04). after that when i tried to open the burp browser, the buttons do not respond. the automatic scans work without problems, apparently the problem is...

Last updated: Oct 18, 2024 07:06AM UTC | 1 Agent replies | 0 Community replies | Bug Reports

Chromeium not working properly

I am attempting to to the brute-force lab 1 and I know I have to paste the url of the login page to chromium but whenever I try and foward it the browser just goes white and nothing shows up. I believe this is a bug with...

Last updated: Oct 18, 2024 06:41AM UTC | 1 Agent replies | 0 Community replies | Bug Reports

Decoder hash buttons broken?

Are the decoder Hash buttons working? text would put of MD5 hash of 'Foobar' shows as '?Õs?ª»¾e¾5Ëæ?àm' instead of '89D5739BAABBBE65BE35CBE61C88E06D'. I'm on Burp v1.6.31

Last updated: Oct 17, 2024 02:33PM UTC | 2 Agent replies | 1 Community replies | Bug Reports

Lab: CSRF where token validation depends on request method

After I paste the CSRF exploit into Body part, I am clicking on the "Store" button firstly. When I click on the "View exploit" button, it changes the user email address. So the exploit works truely. But if I click the...

Last updated: Oct 17, 2024 01:07PM UTC | 2 Agent replies | 1 Community replies | Bug Reports

What type of vulnerability is IDOR?

Does IDOR come under server-side vulnerability or client-side vulnerability?

Last updated: Oct 17, 2024 12:20PM UTC | 1 Agent replies | 0 Community replies | Bug Reports

Bchecks - Passive checks not consistently applied to repeater issued requests + once per path

Hey there :) We spend a lot of time tinkering in the repeater tab. I saw that, after enabling a passive check, it will not necessarily trigger upon receiving the response from a repeater issued request. Example bcheck...

Last updated: Oct 17, 2024 11:00AM UTC | 1 Agent replies | 0 Community replies | Bug Reports

Page 2 of 156

Burp Suite Support Center

Your source for help and advice on all things Burp-related.

Burp Suite Support Center image