webPromedium
PublishWave — XSS via HTTP Cache Poisoning
hackadvisor
Task: PublishWave CMS with JSONP localization endpoint behind Nginx cache that excludes UTM params from cache keys. Solution: Exploit semicolon parameter splitting discrepancy between Nginx and Express to inject malicious callback via utm_content, poisoning the cache to achieve stored XSS and exfiltrate admin flag.
$ ls tags/ techniques/
xssnginxexpressadmin_botparameter_pollutionweb_cache_poisoningcache_key_manipulationcallback_injectionjsonpsemicolon_splittingutm_parameter_exclusion
same_origin_exfiltrationcache_poisoning_via_unkeyed_parametersemicolon_parameter_splittingjsonp_callback_injection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 231 — PagePulse — XSS via Web Cache Poisoning— hackadvisor
- [web][Pro]Lab 33 — PulsePress — Reflected XSS in Search Page— hackadvisor
- [web][Pro]Board of Secrets Revenge— miptctf
- [misc][free]rag-poisoning— umdctf
- [web][Pro]Lab 36 — PulseBoard — Prototype Pollution to RCE via EJS— hackadvisor