- Enter a random alphanumeric string into the search box.
-
Right-click and inspect the element, and observe that your random string has been placed inside an
img srcattribute. -
Break out of the
imgattribute by searching for:"><svg onload=alert(1)>
Lab: DOM XSS in document.write sink using source location.search
This lab contains a DOM-based cross-site scripting vulnerability in the search query tracking functionality. It uses the JavaScript document.write function, which writes data out to the page. The document.write function is called with data from location.search, which you can control using the website URL.
To solve this lab, perform a cross-site scripting attack that calls the alert function.