Skip to content

Commit dacfbb7

Browse files
committed
docs: capitalise step headings and extend blind XSS note
1 parent 4ca97ba commit dacfbb7

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

_posts/2026-03-26-fivem-web-surface.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -84,13 +84,13 @@ the DOM on the wrong side of it.
8484
8585
# Case study
8686

87-
## Step 1: noticing
87+
## Step 1: Noticing
8888

8989
We join a new server — it's got open police slots, great. Playing around we notice evidence bags:
9090
placeable items like bullet casings that accept metadata comments, letting detectives add context
9191
to evidence later in an investigation. Let's dig.
9292

93-
## Step 2: digging
93+
## Step 2: Digging
9494

9595
The script is paid — no public source, documentation behind a paywall. A bit of OSINT surfaces an
9696
outdated leak: obfuscated code and a three-year-old user guide. The UI has changed and the feature
@@ -134,7 +134,7 @@ The inventory is not the only injection point. Admin reports are NUI too — pla
134134
requests, ticket queues. A payload stored in a report body won't visibly render as a script; the
135135
staff member opens what looks like a normal ticket. The payload fires in their client, under their
136136
permissions. They never see it execute. This is blind XSS: the attacker fires and goes offline.
137-
The payload does the rest.
137+
The payload does the rest, sometimes years later.
138138

139139
## Step 4: Persist via Stored XSS
140140

0 commit comments

Comments
 (0)