HackerOne CTF Write-up: Micro-CMS v1

The challenge titled “Micro-CMS v1” is rated as easy difficulty and contains four flags. The challenge provides an introduction to an insecure indexing vulnerability, an (extremely) basic example of SQL injection, and a demonstration of two cross-site scripting vulnerabilities. This challenge helps to drive the point home that submitted forms are not the only user-modifiable fields that can pass data to a server.

Home Page

At the start of the challenge, the home page contains three click able links. The “Testing” link and the “Markdown Test” link direct the user to /page/1 and /page/2, respectively. The “Create a new page” link directs the user to /page/create. The home page is shown in the image below.

Flag 0

Flag 0 is obtained through an insecure indexing vulnerability that can be discovered through the “Create a new page” functionality of the challenge home page. After following the “Create a new page” link, a new page can be created that shows up alongside the “Testing” page (located at /page/1) and the “Markdown Test” page (located at /page/2) on the home page.

After the first new page has been created, the newly created page is located at /page/7 instead of the more logical location of /page/3.

Because of this, it can be inferred that pages 3 through 6 may already exist on the webserver, but that they are not accessible in the same manner (e.g. by following a link) as pages 1 and 2.

Manually browsing to page indices 3, 4, and 6 return “Not Found” errors while index 5 (/page/5) returns a “Forbidden” error. This “Forbidden” error suggests that page 5 exists, but that the user does not have permission to access the file via /page/5.

Using the newly created page 7 as an example, following the “Edit this page” link directs the user to /page/edit/7. This suggests an alternative method of viewing the contents of any indexed page.

Manually browsing to /page/edit/5 reveals Flag 0.

^FLAG^e853fb6a<redacted>$FLAG$

Flag 1

Flag 1 is obtained after attempting SQL injection via a URL. The importance of this flag is the idea that data can be sent to a server in a variety of (sometimes unintended/unexpected) ways.

Using the “Edit this page” functionality present in the web application as an example, an application developer expects (and hopefully has prepared for) a wide variety of user input being passed to the web server through this form. Since the web developer knows that a user can place any text/characters here that they want, the developer has (once again, hopefully) implemented input sanitization on the contents passed to the web server through this form.

In this case, Flag 1 cannot be triggered through the “Edit this page” form. Perhaps, however, the web application developer has failed to consider that the “Edit this page” form is not the only place that needs its input sanitized.

Browsing to /page/edit/1' (or /page/edit/anything_else', for that matter) triggers Flag 1. The ' character used to trigger the flag could cause a SQL error under normal circumstances.

^FLAG^b0538bc7<redacted>$FLAG$

Flag 2

Flag 2 is obtained after triggering a cross-site scripting vulnerability. The concepts described earlier regarding input sanitization remain true for Flag 2 as the developer of the web application failed to consider all attack vectors.

After following the “Create a new page” link from the web application’s home page or after following the “Edit this page” link after browsing to any created and viewable page, it can be seen that the developer of the website boldly states:

Markdown is supported, but scripts are not

Simply put, script tags can be used in cross-site scripting attacks to execute arbitrary commands and display arbitrary content in a victim’s browser.

The devloper’s assertion is true when it comes to script tags that are included in the main input field of the “Create Page” or the “Edit Page” web pages. Entering <script>alert('XSS')</script> into the main input field of the “Create Page” web page or any “Edit Page” web page results in the <script> and </script> tags being filtered out.

If the script tags were not filtered out and a victim were to visit the newly created page, the JavaScript alert function would execute causing an alert window with the characters “XSS” to be displayed in the victim’s browser.

Another place where user input is dispalyed on the website is on the home page. Text that is included in the “Title” field located on the “Create Page” and the “Edit Page” web pages is displayed on the home page of the website. This means that if the contents of the “Title” field are not sanitized, then cross-site scripting can be achieved.

Flag 2 is displayed in the alert pop up upon visiting the home page.

^FLAG^2068a9d8<redacted>$FLAG$

I know you can see the full flag in the GIF, but whatever…

Flag 3

Flag 3 is obtained through another cross-site scripting vulnerability. This time, the vulnerability is a bit more difficult to find. Flag 3 once again exemplifies the importance of considering the wide variety of ways in which information (and code) can be sent from a browser (client) to a server.

For the previous flag, cross-site scripting was achieved through the classic script tag method which executes JavaScript in the victim’s browser. For Flag 3, the onclick event can be used to achieve this same goal.

Similar to the the way that script tags were used to execute the alert JavaScript function for Flag 2, the onclick event can be used to execute JavaScript when a button (or an image) on a web page is clicked.

The “Markdown Test” page located at /page/2 contains the “Some button” button. Clicking the button does nothing.

From this page, following the “Edit this page” link directs to the page with the Markdown and HTML contents shown in the image below:

Changing <button>Some button</button> to <button onclick=alert('XSS')>Some button</button>, saving the changes, and clicking the “Some button” button will result in a popup with the characters “XSS” being displayed within the browser.

Viewing the page source reveals Flag 3 in the HTML button tag.

^FLAG^58de1483<redacted>$FLAG$

This flag can be achieved in the same manner by including <img src='whatever' onclick=alert('XSS')> in the main input field while creating or editing a page, saving the changes, and clicking on the image.

--

--

--

Programmer || Undergraduate CSE student || Free lance Editor || Developer@home ||

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Home Improvement 3D Hack Free Resources Generator

Securing TrueCar, Miles Apart

Vishing, A Threat You Haven’t Thought About — CyberHoot

Passing the CompTIA Security+ Exam on Your First Try, with Little to No Professional Experience

{UPDATE} World of Craft Hack Free Resources Generator

CyberTalents — CatchMomen Writeup

Monetize subscriptions you don’t use — with Revuto!

What happens with your Data ?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Virinchi Sai

Virinchi Sai

Programmer || Undergraduate CSE student || Free lance Editor || Developer@home ||

More from Medium

Port Swigger Lab-SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

WordPress: CVE-2021–29447 — TryHackMe Walkthrough

Brute It [TryHackMe Writeup]

TryHackMe-Gotta Catch’em All!(Pokemon)- Walkthrough by Subhadip Nag(MrL0s3r)