Shazzer logo

Entities allowed before slashes which result in an external URL

Chrome logo 4
Firefox logo 4
Edge logo 4
Safari logo 4

This is an example how you can use the XSS type to fuzz URLs. This one fuzzes entities before double slashes. It uses a base tag to get round the sandboxed iframe problems.

hackvertor
Created byhackvertor
Created Jan 16, 2025
Updated May 27, 2025

Tweet
Detecting browser...
CategoryEntity Parsing
VisibilityPublic
TypeXSS
CharsetUTF-8
$[data1] placeholderhtml_entities
Code used before fuzz:
<script>window.onerror=x=>true;</script>0x0D
<base href="https://example.com" />
Template used:
<a href="$[data1]//example2.com" id=x></a>
Code used after fuzz:
x.protocol === 'https:' && x.host === "example2.com" && log('$[data1]')

Sample payloads

<a href="&bsol;//example2.com" id=x></a>
<a href="&NewLine;//example2.com" id=x></a>
<a href="&sol;//example2.com" id=x></a>
<a href="&Tab;//example2.com" id=x></a>

Fuzz results

Chrome logo
Chrome 144.0.0.0 desktop Windows NT 10.0
Updated28 Jan 2026
Found 4 results
Loading...
Chrome logo
Chrome 132.0.0.0 desktop macOS 10.15.7older version
Updated17 Jan 2025
Found 4 results
Loading...
Firefox logo
Firefox 147.0 desktop Linux
Updated1 Feb 2026
Found 4 results
Loading...
Firefox logo
Firefox 134.0 desktop macOS 10.15older version
Updated16 Jan 2025
Found 4 results
Loading...
Edge logo
Microsoft Edge 144.0.0.0 desktop Windows NT 10.0
Updated31 Jan 2026
Found 4 results
Loading...
Safari logo
Safari 18.5 mobile iOS 18.5
Updated28 May 2025
Found 4 results
Loading...
Safari logo
Safari 18.2 mobile iOS 18.2.1older version
Updated16 Jan 2025
Found 4 results
Loading...
Safari logo
Safari 18.2 desktop macOS 10.15.7older version
Updated17 Jan 2025
Found 4 results
Loading...