This lab uses the HTMLJanitor library, which is vulnerable to DOM clobbering. To solve this lab, construct a vector that bypasses the filter and uses DOM clobbering to inject a vector that alerts
document.cookie. You may need to use the exploit server in order to make your vector auto-execute in the victim's browser.
Note: The intended solution to this lab will not work in Firefox. We recommend using Chrome to complete this lab.
<form id=x tabindex=0 onfocus=alert(document.cookie)><input id=attributes>
iframeto the body:
<iframe src=https://your-lab-id.web-security-academy.net/post?postId=3 onload="setTimeout(someArgument=>this.src=this.src+'#x',500)">. Remember to change the URL to contain your lab ID and make sure that the
postIdparameter matches the
postIdof the blog post into which you injected the HTML in the previous step.
The library uses the
attributes property to filter HTML attributes. However, it is still possible to clobber the
attributes property itself, causing the length to be undefined. This allows us to inject any attributes we want into the
form element. In this case, we use the
onfocus attribute to smuggle an
iframe is loaded, after a 500ms delay, it adds the
"x", which is the form we created inside the comment. The
onfocus event handler then executes the