Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/zigoo0/JSONBee?utm_source=gold_browser_extension
A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.
https://github.com/zigoo0/JSONBee?utm_source=gold_browser_extension
Last synced: 10 days ago
JSON representation
A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.
- Host: GitHub
- URL: https://github.com/zigoo0/JSONBee?utm_source=gold_browser_extension
- Owner: zigoo0
- License: gpl-3.0
- Created: 2018-10-29T10:35:53.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2024-05-06T17:53:51.000Z (6 months ago)
- Last Synced: 2024-07-31T12:07:38.703Z (3 months ago)
- Language: PHP
- Homepage:
- Size: 46.9 KB
- Stars: 638
- Watchers: 20
- Forks: 103
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- favorite-link - 准备好使用 JSONP 端点/有效负载来帮助绕过不同网站的内容安全策略。
README
# JSONBee
A ready to use JSONP endpoints to help bypass content security policy of different websites.The tool was presented during HackIT 2018 in Kiev. The presentation can be found here (not sure why format of the slides is screwed :D): https://www.slideshare.net/Hacken_Ecosystem/ebrahem-hegazy-bug-hunters-manual-for-bypassing-contentsecuritypolicy
# What is JSONBee?
The main idea behind this tool is to find the JSONP endpoint(s) that would help you bypass content security policy for your target website in an automated way. JSONBee takes an input of a url name (i.e. https://www.facebook.com), parses the CSP (Content-Security-Policy), and automatically suggest the XSS payload that would bypass the CSP. It mainly focuses on JSONP endpoints gathered during my bug bounty hunting activities, and could be used to bypass the CSP.
JSONBee relies on 3 methods to gather the JSONP endpoints:
* The repository within this project;
* Google dorks;
* Internet archive (archive.org).The tool is not yet fully completed as I'm still adding some validations and features too. However, the repository will be hosted here so that anyone can use it till the tool is ready.
The repo contains ready-to-use payloads that can bypass CSP for Facebook.com, Google.com and more.
**Bypasing Facebook.com Content-Security policy:**
Facebook.com allows *.google.com in its CSP policy (script-src directive), thus, below payload would work like a charm to execute JavaScript on Facebook.com:
`">`If you came across a website that trusts any of the domains in jsonp.txt file in its script-src directive, then pickup a payload that matches the domain and have fun :)
# How can you help?
You are all welcome to contribute by adding links to sites that uses JSONP endpoins/callbacks to make the repo bigger and more usefull for bug hunters, pentesters, and security researchers.