Post

Armaxis

Armaxis

SOLUTION

By analyzing the source code, we can see admin’s email.

This functionality is vulnerable to IDOR because it verifies the validity of the token but does not check which user the token belongs to. This allows anyone with a valid token to reset another user’s password.

We need to register account for testing with test@email.htb. Then we request to reset password to get token.

Using BurpSuite to inspect and replace our email with admin’s email.

We can see new page here /dispatch

Look at markdow.js file to see if there is any upload file vulnerability.

The markdown parser searches for image tags and fetches the image content, storing it in the database as base64. Since it uses curl , we can include files and potentially leak sensitive information. The below is payload for exploiting.

Inspect the web’s code and we can get Base64 string.

Decode it and get the flag