webPromedium
Museum
hackerlab
Task: a Flask museum site with registration, profiles, and an admin review bot hid the real attack surface behind a public user page. Solution: exploit stored XSS in profile_name, leak the bot pathname, enumerate /user/<id>, read /documents through the bot, recover admin credentials, and open /admin.
$ ls tags/ techniques/
stored_xss_context_exfiltrationpublic_profile_enumerationsame_origin_form_exfiltration
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][free]Guild— hackthebox
- [web][Pro]Bug Bounty-code— hackerlab
- [web][Pro]Dosie X (Dossier X)— hackerlab
- [misc][free]rag-poisoning— umdctf
- [web][Pro]Photo Storage— miptctf