Characters allowed after colon which result in an external URL

Chrome logo 2
Firefox logo 2
Safari logo 2

This is an example how you can use the XSS type to fuzz URLs. It uses a base tag to get round the sandboxed iframe problems.

Created by: hackvertor

Created on: Thursday, January 16, 2025 at 6:56:19 PM

Updated on: Thursday, January 16, 2025 at 6:56:19 PM

Vector type: XSS

Vector charset: UTF-8

Code used before fuzz:
<script>window.onerror=x=>true;</script>
<base href="https://example.com" />
Template used:
<a href="https:$[chr]$[chr]example2.com" id=x></a>
Code used after fuzz:
x.protocol === 'https:' && x.host === "example2.com" && log($[i])
Your browser was detected as:
Detecting... Detecting... Detecting... Detecting...

Sample payloads

<a href="https://example2.com" id=x></a>
<a href="https:\\example2.com" id=x></a>

Fuzz results

Chrome logo
Chrome 132.0.0.0 desktop macOS 10.15.7

Updated

Thu Jan 16 2025
Found 2 results
Loading...
Firefox logo
Firefox 134.0 desktop macOS 10.15

Updated

Thu Jan 16 2025
Found 2 results
Loading...
Safari logo
Safari 17.4 desktop macOS 10.15.7

Updated

Thu Jan 16 2025
Found 2 results
Loading...