Closed ponga2112 closed 3 years ago
Update on testing:
no findings via URL manipulation, fuzzed before and after anchor tag
client state control possible via cookie parameter tampering.. decode base64/change handle, flag, or point values/encode base64 and set as new cookie value. flag values and points values greater than maximum (10flg,1000pts) appear to dump the client state entirely and reset. basically this can only be used to jump to the end with max points. BUT handle name can be controlled outside of normal bounds.. can specify which random # appended (see screeenshot attached below).
Possible to spam user creation requests to obtain multiple users with the same display name and same appended number. Token value for user is unique so this doesn't cause any functional issues, but could result in a filled up leaderboard like in the screenshot attached:
EDIT: retest against this issue resulted in... I think remediation. Leaderboard results show no duplicate users, but when fuzzing /api/create still getting duplicate handles in valid responses.. when trying to use those duplicate handles (max flags capture using their token value), they show up in leaderboard under a different handle number. Some sort of desync happening here.. but at the end of the day, I don't see duplicates in leaderboard so something must be happening right!
Would we consider this data leakage? /.git/config file accessible from web server.
Removed GIT artifacts from webroot.
Last issue fixed, closing out!
Ensuring that our webapp has no dom-based XSS / content injection.. or ay other vulnerabilities in it.