webeasy
The customer is always right
hackerlab
Task: a Flask/Werkzeug publication page reflected the search parameter into HTML and exposed a same-origin report feature. Solution: inject JavaScript through reflected XSS, submit the crafted local URL to the admin bot, and exfiltrate the flag from document.cookie to Webhook.site.
$ ls tags/ techniques/
cookie_exfiltrationreflected_xss_exploitationadmin_bot_abuse
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]