[Cybercamp 2015] [Web 13] Write Up

On the index page, we got a form asking us the hour in seconds, and an html frame pointing to a cgi script, which shows us the hour in letters.
Our first idea was to make a script which will synchronize with the hour printed by the CGI, in order to have the exact hour at the good time, but this leads to just nothing.
Our second idea were really better. We looked for a vulnerability, isn’t it? And we have a CGI script, isn’t it? What if this challenge was an exploitation of our pretty shellshock?

Continue reading [Cybercamp 2015] [Web 13] Write Up

[Cybercamp 2015] [Web 12] Write Up

On the index page, we can see a form containing many fields: first name, age, and a picture field containing a list of image files.

Once this form validated, we see a summary of what we entered previously, and our image, base64 encoded, into an <img> tag. So far, nothing weird.
But, by looking the webpage URL, we could find some datas which could be a serialized PHP object.

http://challenge.cybercamp.es:8092/show.php?u="O:4:"User":3{s:3:"age";s:6:"sdvsdv";s:4:"name";s:6:"dsvsdv";s:7:"picture";s:8:"cat5.png";}"

Why did not try to modify this cat5.png by something else than an image, as show.php for example ? 🙂

Continue reading [Cybercamp 2015] [Web 12] Write Up