Siunam's Website

My personal website

Home About Blog Writeups Projects E-Portfolio

protoTYPE:v2 - sanityXSS

Overview

Background

protoTYPE:v2 is your next music landing page.

Web: http://chal-a.hkcert22.pwnable.hk:28142 , http://chal-b.hkcert22.pwnable.hk:28142

Credit

Music: Pollution - AleMambrin [CC BY 3.0] https://soundcloud.com/djalemambrin/alejandro-mambrin-pollution

Find the flag

In the home page, we can Edit the album, and report abuse!

Edit:

We’re allow to edit the URL! Which very likely can be abused to XSS (Cross-Site Scripting)!

Report Abuse:

In here, we can send an abuse ticket, and an admin will inspect that!

Let’s use Webhook.site to capture the admin requests!

<iframe src="https://webhook.site/5d93b54e-1000-4941-a358-b50e48824e09">

Then send an abuse ticket:

We received a GET request!

User-Agent:

Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36

Hmm… The referer looks sussy: http://prototype:3000/

It’s local, maybe it’s vulnerable to SSRF (Server-Side Request Forgery)?

However, I kept trying different XSS to SSRF paylods like using an <img> tag to redirect to my controlled external JavaScript, using <iframe> tag to read local file (file:///etc/passwd), but still no dice… Maybe it’s not about XSS or SSRF? Like JavaScript prototype pollution??