{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F08%2F20%2F154612\" title=\"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011PortSwigger LAB\u89e3\u8aac\uff1aBypassing access controls using email address parsing discrepancies\uff08\u30e1\u30fc\u30eb\u30d1\u30fc\u30b5\u306e\u89e3\u91c8\u5dee\u3067\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u3092\u8fc2\u56de\uff09 - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_url":"https://blog.hatena.ne.jp/ThisIsOne/","width":"100%","title":"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011PortSwigger LAB\u89e3\u8aac\uff1aBypassing access controls using email address parsing discrepancies\uff08\u30e1\u30fc\u30eb\u30d1\u30fc\u30b5\u306e\u89e3\u91c8\u5dee\u3067\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u3092\u8fc2\u56de\uff09","provider_name":"Hatena Blog","blog_url":"https://cysec148.hatenablog.com/","provider_url":"https://hatena.blog","image_url":null,"version":"1.0","type":"rich","blog_title":"Shikata Ga Nai","published":"2025-08-20 15:46:12","description":"Hello there, ('\u03c9')\u30ce \u306d\u3089\u3044 \u3053\u306eLAB\u306f\u3001\u767b\u9332\u6642\u306e\u30e1\u30fc\u30eb\u30c9\u30e1\u30a4\u30f3\u5236\u9650\uff08@ginandjuice.shop\u306e\u307f\uff09\u3092\u3001\u30e1\u30fc\u30eb\u30a2\u30c9\u30ec\u30b9\u306e\u30d1\u30fc\u30b9\u51e6\u7406\u306e\u98df\u3044\u9055\u3044\u3092\u7a81\u3044\u3066\u7a81\u7834\u3057\u307e\u3059\u3002\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\uff08\u30a2\u30d7\u30ea\u5074\uff09\u3068\u30e1\u30fc\u30eb\u30b5\u30fc\u30d0\uff0f\u30e9\u30a4\u30d6\u30e9\u30ea\u5074\u306e\u201c\u3069\u306e\u6587\u5b57\u5217\u3092\u672c\u5f53\u306e\u30a2\u30c9\u30ec\u30b9\u3068\u307f\u306a\u3059\u304b\u201d\u304c\u30ba\u30ec\u308b\u30dd\u30a4\u30f3\u30c8\u3092\u4f7f\u3044\u3001\u691c\u8a3c\u3067\u306f@ginandjuice.shop\u306b\u898b\u305b\u304b\u3051\u308b\u4e00\u65b9\u3001\u5b9f\u969b\u306e\u9001\u4fe1\u5148\u306f\u81ea\u5206\u306e\uff08Exploit Server\u306e\uff09\u30a2\u30c9\u30ec\u30b9\u306b\u3055\u305b\u307e\u3059\u3002\u5c4a\u3044\u305f\u691c\u8a3c\u30e1\u30fc\u30eb\u306e\u30ea\u30f3\u30af\u3092\u8e0f\u3093\u3067\u30a2\u30ab\u30a6\u30f3\u30c8\u3092\u6709\u52b9\u5316\u3057\u3001carlos\u3092\u524a\u9664\u3057\u3066\u30af\u30ea\u30a2\u3057\u307e\u3059\u3002 \u5168\u4f53\u50cf\uff08\u30b9\u30c8\u30fc\u30ea\u30fc\uff09 \u767b\u9332\u30d5\u30a9\u30fc\u30e0\u3067@ginandjuice.sh\u2026","categories":["Web Security Academy","Business logic"],"height":"190","author_name":"ThisIsOne","url":"https://cysec148.hatenablog.com/entry/2025/08/20/154612"}