You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
XSSAddr is a demo of a cross-site scripting (XSS) vulnerability
Development
Git Workflow
development for bugfixes and new features
Building
make build
Build the application
make clean
Clean the build directory
Features
Demonstrates how malicious input can result in a cross-site scripting (XSS) vulnerability in a web application
Shows how a malicious GET parameter injected into the application can display an attacker address instead of the intended user address
Take advantage of <img> tag onload function to craft malicious payload, replacing the generateAddress function with attacker's address generator function
Requirements
Requires JavaScript
Platforms
Chrome
Firefox
Edge
Usage
Web Browser Usage
Use URL with a GET parameter for userid, xssaddr.html?userid=<payload>
Use any legitimate number for userid to see the intended user sample address
Enter URL-encoded malicious payload to demonstrate XSS vulnerability, replacing user address with the attacker'sample