webPromedium

Lab 73 — NetShield — Reflected XSS via 404 Page Attribute Injection

hackadvisor

Task: NetShield DNS monitoring dashboard reflects URL path unescaped into body tag class attribute on 404 pages; admin bot visits reported URLs. Solution: HTML attribute injection breaks out of class attribute to inject onload handler that exfiltrates admin cookie via same-origin feedback API.

$ ls tags/ techniques/
admin_bot_exploitationreflected_xss_via_attribute_injectionhtml_attribute_breakoutsame_origin_cookie_exfiltrationbody_onload_event_injectionurl_encoding_payload_delivery

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups