0wikipedia.org Cross-Site Scripting Vulnerability (XSS) and PoC Exploit
Important Note: As a result of the interviews I made with Wikimedia, I learned that this site is not related to them. Wikipedia Zero project with only name similarity, this address is not a site belonging to the Wikipedia Zero project.
Unfortunately, there is a security breach in the http://0wikipedia.org project, which has been launched in many countries to provide access to wikipedia.
On the basis of business logic, the redirected URLs are hidden by the Base64 encoding method, and this content is reflected directly on the page.
The open tack is exactly at this point, the attacker can encode it here as a scripted base64 that he wants.
You can see how it looks in the example below:
Vulnerable point is “https://tr.0wikipedia.org/index.php?q=“, so we will inject our base64 encoded script exactly here!
Our base script without encoding :
<br /> </a><ScripT >alert('mksecurity')</script ><a href=></p> <p>
you should pay attention to the gaps!
Base64 encoded script : PjwvYT48U2NyaXBUID5hbGVydCgnbWtzZWN1cml0eScpPC9zY3JpcHQgPjxhIGhyZWY9Pg==
<br /> Please wait while you are redirected...<a href=></a><ScripT >alert('mksecurity')</script ><a href=>></a> ....<br />
This vulnerability applies to all sub-languages of 0wikipedia.org. (tr, en etc.)
So you should be careful before clicking on the links sent to you at 0wikipedia.org.