img/genetic.png

šŸ’» ~/Rooted_Tales 🌐

āš ļø Disclaimer: All writeups and code shared here are meant for educational and ethical hacking purposes only. Use at your own risk.

Hidden in Plain Sight: Chaining CSS Override to XSS & EmailĀ Bombing

Discovery Date: 23rd September 2025

Introduction

After a routine assessment of a Intuiface’s login page, I uncovered a chain of vulnerabilities that, while simple individually, created a significant security risk when combined. This write-up details the journey from spotting a subtle code issue to achieving a successful Cross-Site Scripting (XSS) exploit by manipulating a hidden client-side feature.

Detection

The investigation began with a review of the client-side code. A quick glance at the JavaScript sources revealed a significant red flag: the use of the eval() function.

CodeTwo

CodeTwo is a HackTheBox machine featuring a vulnerable web application with JavaScript execution functionality leading to full system compromise through CVE exploitation and backup tool abuse.

Box Info

NameCodeTwo
TypeMachine
DifficultyEasy
CreatorFisMatHack
Release Date16 August 2025
Linkhttps://app.hackthebox.com/machines/CodeTwo
MY HTB Profilehttps://app.hackthebox.com/profile/1601323

Reconnaissance

Initial Enumeration

Performed Nmap scan and identified 2 open ports 22 and 8000

The Magic Informer

The Magic Informer is a HackTheBox challenge featuring a Node.js application with multiple critical vulnerabilities. This writeup demonstrates how I chained LFI, JWT bypass, and SSRF to achieve RCE.

Box Info

NameThe Magic Informer
TypeChallenge
DifficultyEasy
CreatorRayhan0x01 & makelaris
Release Date17 December 2022

Reconnaissance

Application Overview

The web application features:

HTB Passman

Passman is an easy-rated HackTheBox machine featuring a Node.js password manager vulnerable to IDOR via GraphQL mutations. This writeup demonstrates how I exploited an authorization flaw to change admin passwords and retrieve the flag.

Box Info

NamePassman
OSLinux
DifficultyEasy
Creatorxclow3n
Release Date27 Oct 2022

Reconnaissance

Application Overview

The web application presents a password manager interface:

Hijacking Sessions with postMessage: The Silent DOM XSS Threat

Discovery Date: 18th May 2025

Vulnerability Diagram

Credits to dall-efree.com

Introduction

Imagine a bank teller who accepts withdrawal slips from anyone without checking IDs. A hacker slips in a fake note saying, ā€œGive all money to me,ā€ and the teller blindly obeys.

gif

Credits to: tenor.com

That’s exactly what happens in this DOM XSS vulnerability — where a website blindly trusts messages from any sender, allowing attackers to inject malicious scripts.

CVE-2017-3506 : OS Command Injection in Alibaba WebLogic

Discovery Date: 16th July 2024

/posts/alibaba-cve-2017-3506/img/3.png

Vulnerability Overview

CVE-2017-3506 is a critical vulnerability in Oracle WebLogic Server (WLS) components that allowed unauthenticated remote code execution via malformed XML data in WLS Security subcomponent. During a penetration test of Alibaba’s infrastructure, I identified and exploited this vulnerability to gain server access.

Affected Systems

ComponentVersion
WebLogic Server10.3.6.0
WebLogic Server12.1.3.0
WebLogic Server12.2.1.0-12.2.1.2

Discovery Methodology

Initial Reconnaissance

Identified WebLogic servers using: