I’m stuck on the the client-side prototype pollution challenge. I have the following payload that executed XSS on my end, but when I send the link, I receive no request to my HTTP server:
Anybody managed to find a way to complete the lab? Similarly I am stuck with the admin triggering the exploit. I tried both GET and POST methods and with no-cors for the POST request. Still admin doesn’t trigger the exploit?
Same issue, prototype pollution + XSS works on local, I can grab my own cookies but when sended to admin nothing triggers…
Tried multiple payloads, fetching cookies on local, burp collab, etc…
Can I / We have a hint ? Are they protections to bypass ?
You are not supposed to get the admin’s cookie, but rather construct a link that, when the admin clicks on it, will perform an action that will elevate your privileges. A hint is to inspect the admin page.
Hey, I’m stuck on the part on getting the admin to visit the /admin.php?promote=2 page
I’m able to get the XSS by pointing it to a locally hosted JS file. But when I submit a link in the profile.php page, I don’t receive a request. I’ve been stuck on this for days now. Can anyone give a hint? Thank you
I got the HTTP GET Request that I need to send in order to elevate my privileges and also I was able to craft a payload that sends a GET Request to a URL which I tested in my HTTP Server.
But if I send it to the forms, it doesn’t get executed and I’m not able to access the dashboard.
Still can’t find entry point for race condition. I tried to register an admin user via race condition but even if registration is successful i can’t log in. Also tried race condition on admin.php, but got nothing. Cant find place in code where i can get data before authorization checks via race cond.