admin@blog.internal.clam-corp.com
Docker priv-esc
File permission
Read-Eval-Print Loop... The lesser known parody of the hit song by Calvin Harris: 'Eat-Sleep-Rave Repeat'
Many PHP functions are disabled in order to make this more challenging.
A good approach would be:
print_r(scandir('/'));
orprint_r(readdir(opendir('/')));
to find folders that are of interestprint_r(fread(fopen('/etc/passwd', 'r')));
to read files of interest
Remove restrictions:
unlink('/usr/local/etc/php/conf.d/secure-env.ini');
to remove the restrictive settings file- Re-establish connection to use all PHP functions
PHP application that uses a SQLite database for its backend, but it has three key vulnerabilities.
- Application error handling is not disabled, allowing users to find out extra information about the system
- The database is easily accessible via a HTTP GET request
- Passwords are not hashed in the database
In this challenge, the flag is loaded in from /flag.txt in the root of the file system. This is read out to the user when they login to the admin account. The admin account password is randomised on the container creation. Upon user account creation, the DatabaseManager class leaks the location of the SQLite3 database file, which is web accessible. The user is able to download users.db, viewing the admin account password.
Jason is learning about JWTs, but he forgot to set a key! So the data can be modified by a client...
FastAPI Python application which has automatically generated API endpoints.
The application will
Vulnerability: Accidentally exposes endpoint: /api/admin/reset which has no authentication to reset the admin password.