Hello.
During the pentest of web applications, js files - jquery.prettyPhoto.js can sometimes get caught, if they are version 3.1.4 then you can try DOM-XSS.
To do this, you can insert payload on the page that includes this script -
#prettyPhoto[gallery]/1,<a%20onclick="document.write(document.cookie);">/
For example, I found a site on Wordpress
. Upon verification, I discovered that he was using prettyPhoto 3.1.4 at
To play DOM-XSS you need to click on the link:
https://site.test/#prettyPhoto[gallery]/1,<a%20onclick="document.write(document.cookie);">/
They fixed the vulnerability by replacing prettyPhoto with version 3.1.6.
Earned $ 500.
Thanks for attention.