Click here to reach the vulnerable endpoint.
Use the HTTP Header "x-log" for triggering the vulnerability.