possible XSS… ?

I am able to modify the following contents to include anything I want here besides double quotations:

<div style="background-image:url('/api/assets/##HERE##');"></div> 

Is there a XSS vulnerability possible here? I know it’s possible with double quotes, but it seems like the only character that I won’t be able to input – unless there is a way around it.

Edit: After messing around with this idea a lot more, it doesn’t seem like this will work, unfortunately. In most modern browsers, JS won’t run within a style tag for security reasons. And trust me, I really tried, to the point where I embedded SVGs with JS into the background-image:url(), then used base64 in an attempt to obfuscate it. The SVG viewed fine, but the JS didn’t run.

I’m starting to believe the only way to reach XSS would be to find a way to input double quotes so I can leave the style tag. The reason I’m unable to (from my understanding) is that my input is being sent inside of a JSON format. Then, the raw input inside that JSON is placed into that ###HERE### portion shown earlier. Double quotes break the JSON structure (afaik), and since the raw input is being used, encoding the quotations never seems to get decoded. Any ideas are highly appreciated, we can break this together šŸ˜‚

submitted by /u/coinfang
[link] [comments]

November 20, 2023
Read More >>

Insider Risk Digest: Week 45-46

This Article Insider Risk Digest: Week 45-46 was first published on Signpost Six. | https://ift.tt/MsT80Y5
Introduction In this edition of our Insider Risk Digest for weeks 45-46, we highlight a disturbing case of workplace violence, and the role that …

November 20, 2023
Read More >>

South Korean Robot Kills Its Inspector

I haven’t seen enough attention paid to a tragic story out of South Korea: The robotic arm, confusing the man for a box of vegetables, grabbed him and pushed his body against the conveyer belt, crushing his face and chest, South Korean news agenc…

November 20, 2023
Read More >>