webPromedium
Lab 33 — PulsePress — Reflected XSS in Search Page
hackadvisor
Task: blog platform with search reflecting input in two places with inconsistent sanitization. Solution: exploit reflected XSS in unencoded reflection point, use same-origin comment posting to exfiltrate admin's flag cookie when external requests are blocked.
$ ls tags/ techniques/
admin_bot_exploitationreflected_xss_exploitationsame_origin_data_exfiltrationcookie_theft_via_javascriptdifferential_encoding_bypass
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 231 — PagePulse — XSS via Web Cache Poisoning— hackadvisor
- [web][Pro]Lab 140 — Pressboard — XXE via RSS Feed Import— hackadvisor
- [web][Pro]PublishWave — XSS via HTTP Cache Poisoning— hackadvisor
- [web][Pro]Lab 36 — PulseBoard — Prototype Pollution to RCE via EJS— hackadvisor
- [web][Pro]Lab 326 — PulseBoard — NoSQL Injection in Authentication— hackadvisor