mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-24 21:53:54 +00:00
Fix typo in content-security-policy-csp-bypass
Fix typo from executa to execute
This commit is contained in:
parent
875709e883
commit
4154ac12e0
1 changed files with 1 additions and 1 deletions
|
@ -252,7 +252,7 @@ The post shows that you could **load** all **libraries** from `cdn.cloudflare.co
|
|||
|
||||
#### Abusing google recaptcha JS code
|
||||
|
||||
According to [**this CTF writeup**](https://blog-huli-tw.translate.goog/2023/07/28/google-zer0pts-imaginary-ctf-2023-writeup/?\_x\_tr\_sl=es&\_x\_tr\_tl=en&\_x\_tr\_hl=es&\_x\_tr\_pto=wapp#noteninja-3-solves) you can abuse [https://www.google.com/recaptcha/](https://www.google.com/recaptcha/) inside a CSP to executa arbitrary JS code bypassing the CSP:
|
||||
According to [**this CTF writeup**](https://blog-huli-tw.translate.goog/2023/07/28/google-zer0pts-imaginary-ctf-2023-writeup/?\_x\_tr\_sl=es&\_x\_tr\_tl=en&\_x\_tr\_hl=es&\_x\_tr\_pto=wapp#noteninja-3-solves) you can abuse [https://www.google.com/recaptcha/](https://www.google.com/recaptcha/) inside a CSP to execute arbitrary JS code bypassing the CSP:
|
||||
|
||||
```html
|
||||
<div
|
||||
|
|
Loading…
Reference in a new issue