webhard

Hard 1

spbctf

Task: execute prompt("sibears") via XSS in an img onerror handler where the filter blocks >, single quotes, and double quotes using indexOf(). Solution: bypass the filter using HTML entities (' and ") which pass raw string checks but are decoded by the browser's HTML parser before JavaScript execution in the event handler, enabling JS string breakout and code injection.

$ ls tags/ techniques/
js_string_breakouthtml_entity_encoding_bypassencoding_mismatch_exploitationjs_comment_trailing_syntax

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]