webmedium
Offlinea
hackthebox
Task: Access a Flask backend protected by localhost-only restrictions behind a PHP frontend. Solution: Bypass SSRF protection via HTTP Parameter Pollution (PHP uses last param, Flask uses first), exploit Python .format() string injection on stored URLs to leak SECRET_KEY from app config, forge admin JWT, and access the protected /bartender endpoint via SSRF.
$ ls tags/ techniques/
jwt_forgeryhpp_ssrf_bypasspython_format_string_injectionsecret_key_leak
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]