Very Vulnerable Site
Last updated
Last updated
So i think this site is pretty unbreakable. The flag seems to be impossible to obtain to me, but apparently there are multiple ways to get the flag? Maybe I'm just dumb...
FILE: VeryVulnerableSite.zip
Running the instance will bring us to a website with a login and register page that requires us to input a username and password to get the flag.
From the given app.py
file from unzipping VeryVulnerableSite.zip
, the code of concern is the function (register)
. This function takes username and password inputs from a form, hashes the password using SHA-256, inserts the username, hashed password, and a default value for admin into a SQLite database, and then redirects the user to the index page with a success message.
This is part of the code that is of concern.
By injecting the password directly into the username field, it bypasses the python code's hashing process. After registering with this payload, you can log into the created account with the displayed flag.
The SQL payload was based on this line of the code.
Flag: ACSI{a_v3ry+v8lner4b13_p4g3_w1th_55t1_7wt_5q1i}