Injectable Points

This guide provides detailed information on the various injectable points that Dalfox can identify during scans. Understanding these points can help you better interpret the results and understand where and how payloads are being injected.

Injected Points

Dalfox identifies several types of injectable points in the response. Here are the main categories:

  • inHTML-none: Injection point within HTML content without any surrounding quotes.
  • inJS-none: Injection point within JavaScript content without any surrounding quotes.
  • inJS-double: Injection point within JavaScript content surrounded by double quotes.
  • inJS-single: Injection point within JavaScript content surrounded by single quotes.
  • inJS-backtick: Injection point within JavaScript content surrounded by backticks.
  • inATTR-none: Injection point within an HTML attribute without any surrounding quotes.
  • inATTR-double: Injection point within an HTML attribute surrounded by double quotes.
  • inATTR-single: Injection point within an HTML attribute surrounded by single quotes.

Parameter Types

Dalfox can identify injectable points in different types of parameters:

  • URL: Parameters passed in the URL query string.
  • FORM: Parameters passed in the body of a form submission.

Example

To illustrate how these injectable points work, consider the following example:

inJS-double-URL

This indicates that a value entered into the URL query is reflected in a JavaScript context within double quotes in the response.

Request

/q=testabcd

Response

<script>
  var a = "testabcd";
</script>

In this example, the value testabcd is injected into the JavaScript context within double quotes.