Hi mohammed,

When i found the xss the request was like this:

post /endpoint

Host:

Cookie:

..

body={xss payload}

and the response was an html page contains the xss payload

so i created a basic csrf poc to send this post request as soon as the user opens the evil link

it's basic post csrf poc

Yasser Mohammed (@n3r0li)
Yasser Mohammed (@n3r0li)

Written by Yasser Mohammed (@n3r0li)

My Name Is Yasser and I am a CTF player and Competitive programmer, I Love to build things then break into it.

No responses yet