Tags: csp-bypass xss cors content-spoofing content-injection mime-sniffing mime 

Rating:

Despite a sound Content Security Policy (CSP) in place, the application was
susceptible to four vulnerabilities:

- The HTTP error handler allows arbitrary content injection
- HTTP responses do not instruct the browser to stop sniffing MIME types
- Untrusted user input is not sanitized correctly, due to a faulty
blacklist-based sanitization function
- A harmless-looking input form allows chaining the above vulnerabilities to a
complete exploit

Refer to my original writeup here: https://www.justus.pw/writeups/sekai-ctf/tagless.html

Original writeup (https://www.justus.pw/writeups/sekai-ctf/tagless.html).