XSS Reflected
Last updated
Last updated
Go to login page form https://127.0.0.1/index.php?page=login.php
and log in using login bypass or inserting password.
Go to a page vulnerable to XSS reflected like as: https://127.0.0.1/index.php?page=dns-lookup.php
injecting the javascript payload: <script>alert(document.cookie)</script>
we can execute directly the command and obtain a reflected session cookie id of current account (admin):