support.inlanefreight.local

Sending the request goes to some admin panel for approval.

If XSS exists then we can exploit it to perform session hijacking and log in as the admin.

After trying the following payloads in various fields of ticket submission this one worked:

I get a GET request to my python web server.

Now we just exploit it. Get the session, use cookie editor, get access to the dashboard.

Last updated