Didn't expect that exploiting an #XSS vulnerability would be so hard if all you have is <, > and ". The payload is injected both inside a double-quoted attribute value (sadly, no javascript: URLs) and outside of tags but whitespace, =, &, ', / will all be URL encoded. #bugbounty
-
-
Thought that this nickname sounded familiar. Indeed, he's somebody I watched on the http://sla.ckers.org forum some ten years ago, back when I learned XSS tricks myself.

-
=) which characters get escaped exactly? but yea, without attributes, and without closing tags it's hard. can you use another closing tag in the document? even a self-closing tag would work. Otherwise, maybe try injecting a PDF as consolation prize.
- 4 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.