Description
Login as admin and retrieve the flag.
The flag is the admin’s password.
You can use test:test.
Login as admin and retrieve the flag.
The flag is the admin’s password.
You can use test:test.
On the index page, we got a form asking us the hour in seconds, and an html frame pointing to a cgi script, which shows us the hour in letters.
Our first idea was to make a script which will synchronize with the hour printed by the CGI, in order to have the exact hour at the good time, but this leads to just nothing.
Our second idea were really better. We looked for a vulnerability, isn’t it? And we have a CGI script, isn’t it? What if this challenge was an exploitation of our pretty shellshock?
On the index page, we can see a form containing many fields: first name, age, and a picture field containing a list of image files.
Once this form validated, we see a summary of what we entered previously, and our image, base64 encoded, into an <img> tag. So far, nothing weird.
But, by looking the webpage URL, we could find some datas which could be a serialized PHP object.
http://challenge.cybercamp.es:8092/show.php?u="O:4:"User":3{s:3:"age";s:6:"sdvsdv";s:4:"name";s:6:"dsvsdv";s:7:"picture";s:8:"cat5.png";}"
Why did not try to modify this cat5.png by something else than an image, as show.php for example ? 🙂