1️⃣ Web 300: Kryptos Support
During my enumeration I got a field wherein you can submit via form, and another page which is a login portal.
I submitted a test content and got this:
The response above gave me a hint of possible XSS attack. Which leads me to get an Admin Cookies/Session. I sent a crafted xss payload using https://webhook.site.
Now I have the session cookies.
I installed a cookie editor to use the session that came from the results of my XSS attack.
Then redirected to the admin panel. I didn't find any field or upload files, just the ticket that I submitted.
Upon checking the links, I found a change password field. I tried to change the password of the current account, that's when I noticed that the account I compromised is a moderator.
So I thought that maybe there is an Admin account for this application. Next is enabling the inspect element functions of the browser to check some hidden fields, and that where I got the UID.
I decided to edit the value to 1 and supplied my chosen password and click submit, then I received this message below
I login using admin and my chosen password and was automatically redirected to Home Page with a Flag.
Conclusion: The application is vulnerable to Persistent XSS and IDOR or known as Insecure Direct Object Reference.
Last updated