06 - DOM XSS in jQuery selector sink using a hashchange event
To solve the lab, deliver an exploit to the victim that calls the print() function in their browser.
There is a backlink in the url with the parameter name - returnPath , which is getting called when user go back. We can call javascript protocol to run a alert function. payload would be - javascript:alert(document.cookie)
(in my case aler(1) also worked)
click on back
Lab solved -