Imagine we have this website.

image.png

Open the Debbuger in the browser and see the New Protortype created for the search logger function.

image.png

now let’s Pollute the Prototype

<https://0afc002e04d2a5d5824e43ab008100c7.web-security-academy.net/?__proto__[evil]=test>

image.png

notice that we Polluted the objects

Now let’s read the source code carefully.

image.png

Please notice that we have the Prototype transport_url and if it set the code create a javascript tag and append the value of it to the source of the script.

Now let’s exploit it

<https://0a0600df046c733586671793009b00f9.web-security-academy.net/?__proto__[transport_url]=data:text/javascript,alert(%22Uzumaki%20Remo%22)>

image.png