Basic Another Vulnerability (BAV)

BAV (Basic Another Vulnerability) is a feature in Dalfox that tests for additional vulnerabilities during XSS scanning. By default, BAV is enabled.

Vulnerabilities Tested by BAV

BAV tests for the following vulnerabilities:

  • SQL Injection
  • Server-Side Template Injection (SSTI)
  • Open Redirect
  • CRLF Injection

Disabling BAV

If you do not want to scan for BAV, you can disable it using the --skip-bav option.

Command

dalfox url https://google.com --skip-bav

Output Format

Here is an example of the output you can expect when BAV is enabled:

[*] 🦊 Start scan [SID:Single] / URL: http://localhost:8070/xss/abcd/2
[G] Found CRLF Injection via built-in grepping / original request
[POC][G][CRLF/GET] http://localhost:8070/xss/abcd/2
[I] Found 0 testing point in DOM base parameter mining
[I] Content-Type is text/html; charset=UTF-8is 🔍
[I] Reflected PATH '/xss/dalfoxpathtest/2' => Injected: /inJS-single(1)]
[V] Triggered XSS Payload (found dialog in headless)aiting headless
[POC][V][GET] http://localhost:8070/xss/abcd'-confirm(1)-'/2?=