id: samsung-shop-csp-bypass info: name: Content-Security-Policy Bypass - Samsung Shop author: renniepak,DhiyaneshDK severity: medium reference: - https://github.com/renniepak/CSPBypass/blob/main/data.tsv metadata: verified: true tags: xss,csp-bypass,samsung-shop flow: http(1) && headless(1) http: - method: GET path: - "{{BaseURL}}" matchers: - type: word part: header words: - "Content-Security-Policy" - "samsung.com" condition: and internal: true headless: - steps: - action: navigate args: url: "{{BaseURL}}" - action: waitdialog name: samsung_shop_csp_xss args: max-duration: 5s payloads: injection: - '' fuzzing: - part: query type: replace mode: single fuzz: - "{{url_encode(injection)}}" matchers: - type: dsl dsl: - "samsung_shop_csp_xss == true" # digest: 490a0046304402200196720e2e4ec0bf2ced7ab5ab4c6445b61b8778d34ecc1cb895e0ba6e0578e50220596bcfd94414069b6c4ca5c91bc9371d272f5168057e9c9c5c508be43b57379e:922c64590222798bb761d5b6d8e72950