WebGoat XSS 10 11

WebGoat XSS 10

WebGoat XSS lesson 10

This lesson is about finding routes in client-side code and understanding what is a base route

Firefox Debugger dev tool

Let’s open the dev tools -> Debugger and use the almighty “find in files” functionality and search for “test” or “route”

Searching for “route”

There are many occurrences of “route” in GoatRouter.js, some of those have something to do with “test”

testRoute function

There is a test/:param route that calls a testHandler(param), so the parameter is passed to the lessonController

“parameter” injection is reflected

By going to this URL, whatever is after “test/” gets reflected back to the page so the route is


WebGoat XSS 11

Starting off from what we know from XSS lesson 10, this lesson requires us to execute a JS function by injecting the payload for running webgoat.customjs.phoneHome() in the URL

So let’s copy webgoat.customjs.phoneHome() and paste it in Burp Decoder

URL encoding JS function call

Surround it with <script> tag, URL encode it, paste it in your browser <webgoat ip>:<webgoat port>/WebGoat/start.mvc#test/ and press enter

phoneHome() random number response

In Burp History there should now be a response containing the random number to be used in the lesson input field

This concludes WebGoat XSS 10 11

I hope you liked it.

PVXs — https://twitter.com/pivixih



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store