webmedium

Fragment XML

spbctf

Task: Payment web application where user input in comment field is inserted into XML without escaping. Solution: XML fragment injection to close the current payment element and inject a new one with arbitrary sender, bypassing sender validation.

$ ls tags/ techniques/
xml_fragment_injectionpayment_forgery

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]