webPromedium

PublishWave — XSS via HTTP Cache Poisoning

hackadvisor

Task: PublishWave CMS with JSONP localization endpoint behind Nginx cache that excludes UTM params from cache keys. Solution: Exploit semicolon parameter splitting discrepancy between Nginx and Express to inject malicious callback via utm_content, poisoning the cache to achieve stored XSS and exfiltrate admin flag.

$ ls tags/ techniques/
same_origin_exfiltrationcache_poisoning_via_unkeyed_parametersemicolon_parameter_splittingjsonp_callback_injection

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups