Search K
Appearance
Appearance
Other ways to support HackTricks:
DOM Invader is a browser tool installed in Burp's inbuilt browser. It assists in detecting DOM XSS vulnerabilities using various sources and sinks, including web messages and prototype pollution. The tool is preinstalled as an extension.
DOM Invader integrates a tab within the browser's DevTools panel enabling the following:
postMessage()
method for DOM XSS testing. DOM Invader can also auto-detect vulnerabilities using specially crafted web messages.In the Burp's builtin browser go to the Burp extension and enable it:
Noe refresh the page and in the Dev Tools you will find the DOM Invader tab:
In the previous image you can see a random group of chars, that is the Canary. You should now start injecting it in different parts of the web (params, forms, url...) and each time click search it. DOM Invader will check if the canary ended in any interesting sink that could be exploited.
Moreover, the options Inject URL params and Inject forms will automatically open a new tab injecting the canary in every URL param and form it finds.
If you just want to find potential sinks the page might have, even if they aren't exploitable, you can search for an empty canary.
DOM Invader allows testing for DOM XSS using web messages with features such as:
postMessage()
, akin to Burp Proxy's HTTP request/response history logging.Detailed information can be viewed about each message by clicking on it, which includes whether the client-side JavaScript accesses the origin
, data
, or source
properties of the message.
origin
: If the origin information of the message is not check, you may be able to send cross-origin messages to the event handler from an arbitrary external domain. But if it's checked it still could be insecure.data
: This is where the payload is sent. If this data is not used, the sink is useless.source
: Evaluates if the source property, usually referencing an iframe, is validated instead of the origin. Even if this is checked, it doesn't assure the validation can't be bypassed.DOM Invader can also search for Prototype Pollution vulnerabilities. First, you need to enable it:
Then, it will search for sources that enable you to add arbitrary properties to the Object.prototype
.
If anything is found a Test button will appear to test the found source. Click on it, a new tab will appear, create an object in the console and check if the testproperty
exists:
let b = {}
b.testproperty
Once you found a source you can scan for a gadget:
html
being passed to the innerHTML
sink is shown in the example below.In the previous image it's possible to see that DOM clobbering scan can be turned on. Once done, DOM Invader will start searching for DOM clobbering vulnerabilities.
Other ways to support HackTricks: