webPromedium

Lab 202 — WikiVault — AngularJS Client-Side Template Injection (XSS)

hackadvisor

Task: collaborative wiki platform with AngularJS 1.5.8 search page reflecting user input inside ng-app div without encoding curly braces; admin bot visits reported URLs. Solution: AngularJS CSTI with sandbox escape via charAt/trim override, Function constructor with String.fromCharCode to execute arbitrary JS, exfiltrate admin's non-HttpOnly flag cookie via same-origin comment POST.

$ ls tags/ techniques/
admin_bot_exploitationnon_httponly_cookie_theftangularjs_csti_sandbox_escapesame_origin_data_exfiltration_via_commentsfunction_constructor_arbitrary_jsstring_fromcharcode_parser_bypass

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups