Tags: xss
Rating:
## Web
### Paster
flag: flag{x55_i5Nt_7hA7_bAD_R1Gh7?}
Simple XSS attack, call alert on the screen to get flag
#### payload
```
$ <svg/onload=alert(1)>
```
### Super Secret Flag Vault
flag: flag{!5_Ph9_5TronGly_7yPed?}
php hash issue(weak type comparsion)
```lang=php
$hash = "0e770334890835629000008642775106";
if(md5($_REQUEST["combination"]) == $hash){
echo "
The Flag is flag{...}
";
}
```
Since hash is all digits, and "==", it simply means $hash = 0
set Combination to 240610708 to solve the problem
md5(240610708) == 0e46... == 0
### CookieForge
**Failed**
Got the cookie, seems to be in jwt token
But can't forge(because of the last to dot, can't know what it means)
session: eyJmbGFnc2hpcCI6ZmFsc2UsInVzZXJuYW1lIjoiYWRtaW4ifQ.XqHKwQ.VzPUBGzCO5kAFQ-k1DkzKY7hA80
First one is
> {"flagship":false,"username":"admin"}
simpley change flagship to true won't work because of the latest two terms(kind of signature)
### Custom UI
**Failed**
Seems to be XXE attack
### Online BirthDay Party
**Failed**
SQL-Injection