Characters allowed before the JavaScript protocol
32
32
33
This is an example how you can use the XSS type to fuzz URLs. This one fuzzes characters before the JavaScript protocol. It uses a base tag to get round the sandboxed iframe problems.
Created by: hackvertor
Created on: Thursday, January 16, 2025 at 7:22:56 PM
Updated on: Thursday, January 16, 2025 at 8:31:32 PM
Vector type: XSS
Vector charset: UTF-8
Code used before fuzz:
<script>window.onerror=x=>true;</script>
<base href="https://example.com" />
Template used:
<a href="$[chr]javascript:" id=x></a>
Code used after fuzz:
x.protocol === 'javascript:' && log($[i])
Your browser was detected as:
Detecting... Detecting... Detecting... Detecting...
Sample payloads
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href=" javascript:" id=x></a>
<a href="
javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="
javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
<a href="javascript:" id=x></a>
Fuzz results
Chrome 132.0.0.0 desktop macOS 10.15.7
Updated
Thu Jan 16 2025
Found 32 results
Loading...
Firefox 134.0 desktop macOS 10.15
Updated
Thu Jan 16 2025
Found 32 results
Loading...
Safari 17.4 desktop macOS 10.15.7
Updated
Thu Jan 16 2025
Found 33 results
Loading...
Safari 18.2 mobile iOS 18.2.1
Updated
Thu Jan 16 2025
Found 32 results
Loading...