Burp Suite User Forum

Create new post

how to exploit this Data is read from window.location.hash and passed to $() via the following statements:

harsh | Last updated: Apr 10, 2020 03:40PM UTC

var sPageURL = window.location.hash.substring(1); var sURLVariables = sPageURL.split('&'); var sParameterName = sURLVariables[i].split('='); $(sParameterName[1].split(',')).each(function(){ hash.position.push(parseFloat(this)); });

Liam, PortSwigger Agent | Last updated: Apr 14, 2020 11:39AM UTC

Does this code snippet come from a Burp issue report?

M | Last updated: Nov 17, 2022 07:43PM UTC

yes

Liam, PortSwigger Agent | Last updated: Nov 22, 2022 07:11AM UTC

Hi Akhilesh. Are you having an issue with a Burp report following a scan?

bader23 | Last updated: Dec 04, 2023 01:47PM UTC

How to prove the concept for this vulnerability Data is read from window.location.hash and passed to $() via the following statements: var filterList=$('.js-filterList'),filterTrigger=$('.js-filterTrigger'),filterTarget,hash=window.location.hash.substring(1),whiteList=[]; $('[data-filter="'+hash+'"]').trigger('click');

You must be an existing, logged-in customer to reply to a thread. Please email us for additional support.