🔍 Product Search

Find products in our inventory

🎯 Difficulty: Easy 📡 POST-based XSS

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/index.php:1) in /var/www/html/index.php on line 234

📚 Lab Information

Objective: Extract the flag from the xss_flag cookie and display it in an alert dialog.

Challenge: This vulnerability uses POST request and requires understanding of HTML attribute injection.