🤯
Mazin
  • 🤔INTRODUCTION
    • Whoami
  • ☀️Notes
    • Leaked Credentials
    • IIS
    • CMS
    • pentesting4arabs
    • 2FA Bypass
    • Android
    • Monitor CVEs
    • Shodan Queries
    • Sites & Repos for bug hunting
    • Sites for scanning & etc
  • 🔥CTFS
    • Sites to solve Ctfs
    • HTB Apoc 2023
  • 💸Bug Bounty Writeups
    • Origin IP Access WAF Bypass
    • My First Big Bounty
    • Exposed Docker Registry
    • Squarespace Subdomain Takeover
Powered by GitBook
On this page
  1. Notes

CMS

PreviousIISNextpentesting4arabs

Last updated 9 months ago

for Drupal: https://nahoragg.medium.com/chaining-cache-poisoning-to-stored-xss-b910076bda4f

example.com/wp-json, You can try CORS, if you find it activated in Endpoint, then try cache poisoning with CORS, it will take you to DOS. This is because when you add Origin: evil.com With cache, any external site that will try to use cors to read data from the API will not be able to, because your original has cache.

☀️
SecLists/Discovery/Web-Content/CMS at master · danielmiessler/SecListsGitHub
Logo