Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/qeeqbox/client-side-template-injection

A threat actor may trick a victim into executing native template syntax on a vulnerable target
https://github.com/qeeqbox/client-side-template-injection

client infosecsimplified injection qeeqbox side template vulnerability

Last synced: about 6 hours ago
JSON representation

A threat actor may trick a victim into executing native template syntax on a vulnerable target

Awesome Lists containing this project

README

        

A threat actor may trick a victim into executing native template syntax on a vulnerable target (This is similar SSTI but happens on the client side)

## Example #1
1. Threat actor crafts an exploit URL
2. Bob logs in to the vulnerable website
3. Threat actor tricks Bob into clicking on the exploit URL
4. Bob clicks on the exploit URL, and the browser executes the exploit

## Code
#### Target-Logic
```html




var url = new URL(window.location);
var alert = url.searchParams.get("alert");
document.getElementById('alert').innerHTML = alert
document.body.style.backgroundColor = alert

```

#### Target-In
```
/?alert=
```

#### Target-Output
```
alert box: test
```

## Impact
Vary

## Risk
- Command execution

## Redemption
- Input validation
- Logic-less

## Names
- Client Side Template Injection
- SST injection

## ID
477ac741-89fe-4d0b-b094-09d720ed9d83

## References
- [tenable](https://www.tenable.com/plugins/was/112684)