Exceptional Laravel and IPv6 bypass - Linux Examples (web) from m0leCon Teaser 2023

- ctf writeup web
The m0leCon CTF Teaser took place this weekend. We played only very lightly, as most of the team was busy organizing the HackTM CTF 2023 Finals in TimiÈ™oara. I solved this challenge only, while taking a break from exam preparation :P Description I wrote a simple website with some linux command examples, I hope you’ll like it! Author: @Giotino Files: linux-examples.zip Solves: 14 Points: 222 Approach When first looking at a web challenge, I like to first explore its functionality without looking at the source code. Read more...

Chaining postMessage XSS on active24.cz

- xss bugbounty web
I manage a few websites and domains with the hosting provider active24.cz, one time I decided to take a closer look at their security. After a while of fiddling around I noticed a bunch of postMessages flowing between support.active24.cz and active24.cz origins every time the page was loaded, it was the live support chat system they were using. The main page was iframing https://support.active24.cz/scripts/generateWidget.php and then included a script to communicate with it, handing over information like user ID, if the user is logged in etc. Read more...

The time I found a persistent DOM XSS on DuckDuckGo

- xss bugbounty web
In the summer of 2020, I found a not-so-interesting but impactful XSS on the DuckDuckGo search engine. I looked into the security of their Cloud Save feature, which lets you have your preferences (colour scheme, styles etc.) saved and then restored in a privacy-friendly way using a passphrase. The passphrase gets hashed and is used as an API key to access them. I enumerated all the possible options you can save in the preferences object and found two interesting ones. Read more...