protoTYPE:v2 - sanityXSS
Overview
-
Overall difficulty for me (From 1-10 stars): ★★★★★★★★★★
-
Challenge difficulty: ★★☆☆☆
Background
protoTYPE:v2 is your next music landing page.
Web: http://chal-a.hkcert22.pwnable.hk:28142 , http://chal-b.hkcert22.pwnable.hk:28142
Credit
Music: Pollution - AleMambrin [CC BY 3.0] https://soundcloud.com/djalemambrin/alejandro-mambrin-pollution
Find the flag
In the home page, we can Edit
the album, and report abuse!
Edit:
We’re allow to edit the URL! Which very likely can be abused to XSS (Cross-Site Scripting)!
Report Abuse:
In here, we can send an abuse ticket, and an admin will inspect that!
Let’s use Webhook.site to capture the admin requests!
<iframe src="https://webhook.site/5d93b54e-1000-4941-a358-b50e48824e09">
Then send an abuse ticket:
We received a GET request!
User-Agent:
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Hmm… The referer
looks sussy: http://prototype:3000/
It’s local, maybe it’s vulnerable to SSRF (Server-Side Request Forgery)?
However, I kept trying different XSS to SSRF paylods like using an <img>
tag to redirect to my controlled external JavaScript, using <iframe>
tag to read local file (file:///etc/passwd
), but still no dice… Maybe it’s not about XSS or SSRF? Like JavaScript prototype pollution??