Reflected XSS into a Template Literal with angle brackets, single, double quotes, backslash and backticks Unicode-escaped

Objective

  1. After the landing page is loaded, go to searchbox in the website.

  2. Submit a random alphanumeric string in the search box.
  3. Observe that the random string has been reflected between javascript template literals.

    What is a template literal

    Go to the resource !

    Here is the real deal, your input is inside the template literals and that means it is possible to inject embedded expressions via using ${} syntax. Also remember that single quotes are just normal characters inside of literals(`), due to that your input is going to work like a charm.

  4. Inject the following payload:

  5. Hit the search button.

  6. Also observe that your input successfully implemented between the template literals.

  7. Click OK button or refresh the page and lab instance should have been solved.