Hintru Tip ENES ← All labs

Bugforge MesaNet

EN hard CTF challenge Web Cache PoisoningXSSHeader InjectionStored XSSCSRFBot ExploitationExfiltration
Original

MesaNet is a Black Mesa Transit rail broadcast panel running on Bugforge's lab infrastructure. The application caches API responses and reflects a custom header value directly into HTML, creating a chained attack path: poison the cache with a script injected via a custom header, then trick a bot into viewing the poisoned page — causing it to exfiltrate its private notes (and the flag) to an attacker-controlled webhook.

0/7
solved
Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7
web

Step 3 · Confirm header reflection and injection point

Objective: Verify that the value of the X-Rail-Skin request header is reflected in the HTML response, and determine the exact HTML context in which it appears.

Context: The /api/rail/display endpoint reflects the X-Rail-Skin header value in the response HTML. You need to confirm this reflection is controllable and understand the exact tag structure so you can plan an escape.

Progressive hints

Only reveal the ones you need. Claude tracks how many you used to calibrate the feedback.

Hint 1 — directional nudge

Send a modified request to /api/rail/display with a custom, recognizable value in the X-Rail-Skin header and check where it lands in the response.

Hint 2 — technique / vuln class

The value is injected inside an HTML <link> tag attribute (href). Think about what characters you need to inject to break out of the attribute and the tag itself.

Hint 3 — near solution

Send: X-Rail-Skin: <svg onload=alert(1)> and observe that it reflects in both the X-Rail-Skin response header and in the HTML body. To achieve XSS you need to first close the <link> tag — try injecting a value like /css/default.css"> followed by your script.

Your attempt

Spotted something to improve?

Polish the wording, sharpen a hint, add missing context, fix a payload — your version stays separate from the original and other learners can choose it.

⚠ Report this lab

Enjoying Hintru? Buy me a coffee ☕ ☕