The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

how to exploit this Data is read from window.location.hash and passed to $() via the following statements:

harsh | Last updated: Apr 10, 2020 03:40PM UTC

var sPageURL = window.location.hash.substring(1); var sURLVariables = sPageURL.split('&'); var sParameterName = sURLVariables[i].split('='); $(sParameterName[1].split(',')).each(function(){ hash.position.push(parseFloat(this)); });

Liam, PortSwigger Agent | Last updated: Apr 14, 2020 11:39AM UTC

Does this code snippet come from a Burp issue report?

M | Last updated: Nov 17, 2022 07:43PM UTC

yes

Liam, PortSwigger Agent | Last updated: Nov 22, 2022 07:11AM UTC

Hi Akhilesh. Are you having an issue with a Burp report following a scan?

bader23 | Last updated: Dec 04, 2023 01:47PM UTC