Skills Assessment

  • Try to escalate your privileges and exploit different vulnerabilities to read the flag at '/flag.php'.

To login in the panel, i can see a uid indentifier -->

I modify it for example uid=1 -->

Then login i can see another peticion with uid nad user url uid, change it by 1 for example -->

OKAY, i am another user, i will go to reload the profile web and intercept another this peticion for see mor info about others users -->

OKAY, i can enumerate user with this uid, go to intruder -->

okayy!!! user with uid==52 is Administrator,s e that -->

Okay, i can only see this, true. WHO I CAN BE ADMIN USER??

In my user, i have a section of change my password, go to intercept it -->

Allright, first it call a /api.php/tohen, and it send my uid too -->

OKAY, the sen mi token user and uid with the new password and send by POST to /reset.php. Now, modify it again -->

In the first peticon to /api.php/token, modify the uid to admin==52 -->

He give me his token user, nice: {"token":"e51a85fa-17ac-11ec-8e51-e78234eb7b0c"} COPY IT

After alterate all camps, give me an error "Acces Denied" .. F&CK U! So.. i will ty to Change request method -->

OKAY! F&cking http verb tampening ... Now log in to Administrador

Intercep the peticon and chang the uid by 52 -->

I can see a category with name, add event, so...

Now intercept it to see the body -->

I can see a XML struccture, and lohh0 reflected, so now i will try to read an internal file -->

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE name [
  <!ENTITY company "Inlane Freight">
]>
            <root>
            <name>&company;</name>
            <details>test2</details>
            <date>2002-02-12</date>
            </root>

So... with it i can read the flag -->

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE email [
  <!ENTITY company SYSTEM "php://filter/convert.base64-encode/resource=/flag.php">
]>
            <root>
            <name>&company;</name>
            <details>test2</details>
            <date>2002-02-12</date>
            </root>

Last updated