I am testing a reflected XSS vulnerability on the following URL parameter:
https://public-firing-range.appspot.com/reflected/url/css_import?q=payload
When I test with JavaScript payloads such as:
javascript:alert(1)
or the payloads generated by XSStrike, no pop-up appears in the browser.
After inspecting the source code of the page, I found it looks like this:
<html>
<head>
<link rel="stylesheet" href="payload" />
</head>
<body>
</body>
</html>
It seems that the parameter q is directly injected into the href attribute of a tag.
How can I solve it?