From 4154ac12e04579609f75155094437b4d773cf64d Mon Sep 17 00:00:00 2001 From: Jinil Kim Date: Sun, 17 Sep 2023 22:40:55 +0900 Subject: [PATCH] Fix typo in content-security-policy-csp-bypass Fix typo from executa to execute --- pentesting-web/content-security-policy-csp-bypass/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pentesting-web/content-security-policy-csp-bypass/README.md b/pentesting-web/content-security-policy-csp-bypass/README.md index 8eea56ae2..dd10f08b7 100644 --- a/pentesting-web/content-security-policy-csp-bypass/README.md +++ b/pentesting-web/content-security-policy-csp-bypass/README.md @@ -252,7 +252,7 @@ The post shows that you could **load** all **libraries** from `cdn.cloudflare.co #### Abusing google recaptcha JS code -According to [**this CTF writeup**](https://blog-huli-tw.translate.goog/2023/07/28/google-zer0pts-imaginary-ctf-2023-writeup/?\_x\_tr\_sl=es&\_x\_tr\_tl=en&\_x\_tr\_hl=es&\_x\_tr\_pto=wapp#noteninja-3-solves) you can abuse [https://www.google.com/recaptcha/](https://www.google.com/recaptcha/) inside a CSP to executa arbitrary JS code bypassing the CSP: +According to [**this CTF writeup**](https://blog-huli-tw.translate.goog/2023/07/28/google-zer0pts-imaginary-ctf-2023-writeup/?\_x\_tr\_sl=es&\_x\_tr\_tl=en&\_x\_tr\_hl=es&\_x\_tr\_pto=wapp#noteninja-3-solves) you can abuse [https://www.google.com/recaptcha/](https://www.google.com/recaptcha/) inside a CSP to execute arbitrary JS code bypassing the CSP: ```html