06 Lab: DOM XSS in jQuery selector sink using a hashchange event
This lab contains a DOM-based cross-site scripting vulnerability on the home page. It uses jQuery's $() selector function to auto-scroll to a given post, whose title is passed via the location.hash property.
To solve the lab, deliver an exploit to the victim that calls the print() function in their browser.
Teoría



Previous04 Lab: DOM XSS in innerHTML sink using source location.searchNext07 Lab: Reflected XSS into attribute with angle brackets HTML-encoded
Last updated