Hintru Tip ENES ← All labs

Bugforge MesaNet

EN hard CTF challenge Web Cache PoisoningXSSHeader InjectionStored XSSCSRFBot ExploitationExfiltration
Original

MesaNet is a Black Mesa Transit rail broadcast panel running on Bugforge's lab infrastructure. The application caches API responses and reflects a custom header value directly into HTML, creating a chained attack path: poison the cache with a script injected via a custom header, then trick a bot into viewing the poisoned page — causing it to exfiltrate its private notes (and the flag) to an attacker-controlled webhook.

0/7
solved
Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7
enumeration

Step 2 · Analyze the /api/rail/display response headers

Objective: Inspect the HTTP response from the newly discovered /api/rail/display endpoint and identify any unusual or application-specific headers that could be exploitable.

Context: You have found two endpoints: /api/rail/current (the default broadcast feed) and /api/rail/display. Send a manual GET request to /api/rail/display and examine both request and response headers carefully in Burp Suite.

Progressive hints

Only reveal the ones you need. Claude tracks how many you used to calibrate the feedback.

Hint 1 — directional nudge

Look beyond the standard HTTP headers in the response — the application may be returning custom or non-standard headers that hint at server-side behavior.

Hint 2 — technique / vuln class

Pay attention to caching-related headers (Cache-Control, X-Cache, X-Cache-Age) and any application-specific headers. A custom header whose value appears in the response body is a strong signal.

Hint 3 — near solution

Note the Cache-Control: public, max-age=60 header (60-second cache window), the X-Cache: MISS/HIT header, and especially the X-Rail-Skin header in the response. Check if the X-Rail-Skin value is reflected anywhere in the HTML response body.

Your attempt

Spotted something to improve?

Polish the wording, sharpen a hint, add missing context, fix a payload — your version stays separate from the original and other learners can choose it.

⚠ Report this lab

Enjoying Hintru? Buy me a coffee ☕ ☕