Intigriti March 2026 XSS Challenge Writeup: Chaining 3 Bypasses to Steal Admin Cookies
嗯,用户让我总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是一个XSS挑战,涉及到DOM净化、CSP和SANITIZE_DOM这些安全措施。作者通过DOM污染、组件劫持和隐藏的JSONP端点成功窃取了管理员的cookie。整个过程用了两秒,还提到了感谢设计者和团队的帮助。 接下来,我需要将这些信息浓缩到一百字以内。要突出关键点:挑战名称、使用的漏洞、攻击方法以及结果。同时,语言要简洁明了。 可能会遇到的问题是如何在有限的字数内涵盖所有重要信息。比如,“DOM clobber”、“component hijack”、“hidden JSONP endpoint”这些术语是否需要简化?或者直接用中文表达会更清楚? 另外,用户要求不需要特定的开头,所以直接描述内容即可。可能需要调整句子结构,使其更紧凑。 最后,检查一下字数是否符合要求,并确保没有遗漏关键信息。 </think> 作者通过利用DOM污染、组件劫持和隐藏的JSONP端点,在Intigriti 2026年3月XSS挑战中成功绕过DOMPurify + CSP + SANITIZE_DOM的安全防护,仅用两秒窃取了管理员机器人的flag cookie。 2026-4-1 06:35:31 Author: infosecwriteups.com(查看原文) 阅读量:6 收藏

Mrunal chawda

How a DOM clobber, a component hijack, and a hidden JSONP endpoint gave me full cookie exfiltration through DOMPurify + CSP + SANITIZE_DOM in the Intigriti March 2026 XSS challenge. From reading source code to stealing the admin bot’s flag cookie in 2 seconds.

Press enter or click to view image in full size

First things first. Huge shoutout to @KulinduKodi for designing this challenge. The layered defense approach with DOMPurify + CSP + SANITIZE_DOM made this one of the most satisfying exploit chains I have ever assembled. And a big thanks to the Intigriti team for dropping those hints and publishing the custom wordlist blog post right when I was about to throw my laptop out the window. That nudge saved my sanity.

Press enter or click to view image in full size

The Challenge: What Are We Up Against?

Picture this. You land on a sleek, dark-themed portal called ThreatCenter — a “Secure Search Portal.” There is a search box at the top. You type a query, it gets processed, and results appear on the page. Simple enough on the surface.

Under the hood, here is what happens when you search for something. The application takes your…


文章来源: https://infosecwriteups.com/intigriti-march-2026-xss-challenge-writeup-chaining-3-bypasses-to-steal-admin-cookies-4e1910864582?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh