webeasy

The customer is always right

hackerlab

Task: a Flask/Werkzeug publication page reflected the search parameter into HTML and exposed a same-origin report feature. Solution: inject JavaScript through reflected XSS, submit the crafted local URL to the admin bot, and exfiltrate the flag from document.cookie to Webhook.site.

$ ls tags/ techniques/
cookie_exfiltrationreflected_xss_exploitationadmin_bot_abuse

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]