Corporate Life 1

Category
Web Exploitation
Points
-1
Solves
-1
Tags

The Request Management App is used to view all pending requests for each user. It’s a pretty basic website, though I heard they were working on something new.

Anyway, did you know that one of the disgruntled employees shared some company secrets on the Requests Management App, but it’s status was set denied before I could see it. Please find out what it was and spill the tea!

This Challenge unlocks another challenge in this Series


Given a website that uses Next.js. This website has a feature to view pending requests. Since there are no interesting network requests, i tried to look at the source code of this website.

alt text

In the source code i found a path /v2-testing in the _buildManifest.js file. i tried to access the path and found a form asking for input and a filter.

alt text

alt text

After filtering we can see on the network that it will make a request to /api/list-v2 with the POST method. I tried to do SQL Injection with the payload ' OR 1=1 -- and managed to get the flag.

Payload:

{
  "filter": "' OR 1=1 --"
}
Corporate Life 1 Flag: KashiCTF{s4m3_old_c0rp0_l1f3_T9Y6x1Se}