AngularJS sandbox
https://www.w3schools.com/angular/ng_ng-app.asp
If a site loads angular.js plugin, then worth checking if able to escape its sandbox and perform xss.
Sandbox restricts access to windows or document and dangerous properties such as __proto__ , bypasses are available.
Note : post AngularJS in version 1.6, sandbox was removed.
Working:
Sandbox parses expression, rewrites JS and tests whether rewritten code contains any dangerous objects.
This can be object references, properties referenced, methods invoked



AngularJS sandbox escapes:
Using charAt() globally within an expression.

LAB 1:
Simply using payload for this angular version didn't work.
Last updated
Was this helpful?