ponga2112 / websec-ctf-for-n00bs

Web Application Security Capture the Flag Game for the Uninitiated
MIT License
1 stars 0 forks source link

Phase 3: Vulnerability Assessment #17

Closed ponga2112 closed 3 years ago

ponga2112 commented 4 years ago

Ensuring that our webapp has no dom-based XSS / content injection.. or ay other vulnerabilities in it.

c-h-a-n-c-e commented 4 years ago

Update on testing:

c-h-a-n-c-e commented 3 years ago

Possible to spam user creation requests to obtain multiple users with the same display name and same appended number. Token value for user is unique so this doesn't cause any functional issues, but could result in a filled up leaderboard like in the screenshot attached:

2020-11-17 11_12_12-Capture the Flag

EDIT: retest against this issue resulted in... I think remediation. Leaderboard results show no duplicate users, but when fuzzing /api/create still getting duplicate handles in valid responses.. when trying to use those duplicate handles (max flags capture using their token value), they show up in leaderboard under a different handle number. Some sort of desync happening here.. but at the end of the day, I don't see duplicates in leaderboard so something must be happening right!

image

c-h-a-n-c-e commented 3 years ago

Would we consider this data leakage? /.git/config file accessible from web server.

image

ponga2112 commented 3 years ago

Removed GIT artifacts from webroot.

c-h-a-n-c-e commented 3 years ago

Last issue fixed, closing out!