BOOK THIS SPACE FOR AD
ARTICLE ADThis lab is built on Node.js and the Express framework. It is vulnerable to serve r-side prototype pollution because it unsafely merges user-controllable input into a server-side JavaScript object. This is simple to detect because any polluted properties inherited via the prototype chain are visible in an HTTP response | Karthikeyan Nagaraj
This lab is built on Node.js and the Express framework. It is vulnerable to server-side prototype pollution because it unsafely merges user-controllable input into a server-side JavaScript object. This is simple to detect because any polluted properties inherited via the prototype chain are visible in an HTTP response.
To solve the lab:
Find a prototype pollution source that you can use to add arbitrary properties to the global Object.prototype.Identify a gadget property that you can use to escalate your privileges.Access the admin panel and delete the user carlos.You can log in to your own account with the following credentials: wiener:peter
Study the address change feature
Log in and visit your account page. Submit the form for updating your billing and delivery address.In Burp, go to the Proxy > HTTP history tab and find the POST /my-account/change-address request.Observe that when you submit the form, the data from the fields is sent to the server as JSON.Notice that the server responds with a JSON object that appears to represent your user. This has been updated to reflect your new address information.Send the request to Burp Repeater.Identify a prototype pollution source
In Repeater, add a new property to the JSON with the name __proto__, containing an object with an arbitrary property:"__proto__": { "foo":"bar" }Send the request.Notice that the object in the response now includes the arbitrary property that you injected, but no __proto__ property. This strongly suggests that you have successfully polluted the object's prototype and that your property has been inherited via the prototype chain.
Identify a gadget
Look at the additional properties in the response body.Notice the isAdmin property, which is currently set to false.Craft an exploit
Modify the request to try polluting the prototype with your own isAdmin property:"__proto__": { "isAdmin":true }Send the request. Notice that the isAdmin value in the response has been updated. This suggests that the object doesn't have its own isAdmin property, but has instead inherited it from the polluted prototype.In the browser, refresh the page and confirm that you now have a link to access the admin panel.Go to the admin panel and delete carlos to solve the lab.
A YouTube Channel for Cybersecurity Lab’s Poc and Write-ups
Telegram Channel for Free Ethical Hacking Dumps
Thank you for Reading!
Happy Ethical Hacking ~
Author: Karthikeyan Nagaraj ~ Cyberw1ng