Burp Suite User Forum

Login to post

how to exploit this Data is read from window.location.hash and passed to $() via the following statements:

harsh | Last updated: Apr 10, 2020 03:40PM UTC

var sPageURL = window.location.hash.substring(1); var sURLVariables = sPageURL.split('&'); var sParameterName = sURLVariables[i].split('='); $(sParameterName[1].split(',')).each(function(){ hash.position.push(parseFloat(this)); });

Liam, PortSwigger Agent | Last updated: Apr 14, 2020 11:39AM UTC

Does this code snippet come from a Burp issue report?

M | Last updated: Nov 17, 2022 07:43PM UTC

yes

Liam, PortSwigger Agent | Last updated: Nov 22, 2022 07:11AM UTC

Hi Akhilesh. Are you having an issue with a Burp report following a scan?

You need to Log in to post a reply. Or register here, for free.