The post explores a stored cross-site scripting (XSS) vulnerability in a web application's comment functionality, focusing on how to bypass sanitization measures that HTML-encode angle brackets and double quotes, and escape single quotes and backslashes. It provides a step-by-step guide to inject a malicious JavaScript payload

3m read timeFrom infosecwriteups.com
Post cover image

Sort: