The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Reflected XSS into HTML context with all tags blocked except custom ones

Dario | Last updated: Mar 08, 2023 01:15PM UTC

ello, I tried copying and pasting the solution, replacing the LAB ID, which in my case from the link https://exploit-0a2e00f604bd5197c065ff3c01aa00ea.exploit-server.net/exploit was "exploit-0a2e00f604bd5197c065ff3c01aa00ea" and pasted it into the script <script> location = 'https://YOUR-LAB-ID.web-security-academy.net/?search=%3Cxss+id%3Dx+onfocus%3Dalert%28document.cookie%29%20tabindex=1%3E#x'; </script> so it looks like this to me : <script> location = 'https://exploit-0a2e00f604bd5197c065ff3c01aa00ea.web-security-academy.net/?search=%3Cxss+id%3Dx+onfocus%3Dalert%28document.cookie%29%20tabindex=1%3E#x'; </script> Unfortunately after doing the "store" and "delivery" it doesn't give me the "solved lab", I also tried changing the payload to different variants : 'https://0a2e00f604bd5197c065ff3c01aa00ea.web-security-academy.net/? 'https://exploit-0a2e00f604bd5197c065ff3c01aa00ea.web-security-academy.net/? 'https://exploit-0a2e00f604bd5197c065ff3c01aa00ea.exploit-server.net/? 'https://0a2e00f604bd5197c065ff3c01aa00ea..exploit-server.net/? Can you help me?

Dario | Last updated: Mar 08, 2023 08:12PM UTC