From c7dc315315826a4092dda6b9b5896485513470bb Mon Sep 17 00:00:00 2001 From: Yan Date: Thu, 6 Feb 2025 00:15:16 -0700 Subject: [PATCH] debug tips --- web-security/xss-rf-get/DESCRIPTION.md | 14 ++++++++++++++ web-security/xss-stored-alert/DESCRIPTION.md | 12 ++++++++++++ web-security/xss-stored-html/DESCRIPTION.md | 8 ++++++++ 3 files changed, 34 insertions(+) diff --git a/web-security/xss-rf-get/DESCRIPTION.md b/web-security/xss-rf-get/DESCRIPTION.md index f17fc9f..eca2dad 100644 --- a/web-security/xss-rf-get/DESCRIPTION.md +++ b/web-security/xss-rf-get/DESCRIPTION.md @@ -5,3 +5,17 @@ This can be done in a number of ways, including using JavaScript's `fetch()` fun This challenge implements a more complex application, and you will need to retrieve the flag out of the `admin` user's unpublished draft post. After XSS-injecting the `admin`, you must use the injection to make an HTTP request (as the `admin` user) to enable you to read the flag. Good luck! + +---- +**DEBUGGING:** +This level adds an additional bit of complexity to the injected script: the `fetch()`. +Now, three things can go wrong: + +1. The `