The .git folder in particular caught my attention. In the industry we see a decent amount of new developers that include their .git folder within their webapp, and that is a HUGE flaw. The other file worth noticing was the md5.js file, which may indicate that the site is leveraging client-side hashing.
Step 1: Download all the Things
Exposing a .git directory allows anyone to “pillage” the repository, using tools to recreate the source code from object files. DVCS-Pillage is a tool that will allow us to pillage their repository, hopefully allowing us to gain access to their source code.
Run the script on the target and you’ll see that it wants to make 8 requests. Allow it. After the script is complete you will have access to (some of) the site’s PHP code.
Step 2: Analyze all the Things
One of the first things I noticed was the obvious ___HINT___ file. Taking a quick look, it didn’t appear overly helpful:
Before planting grass, add compost or other soil amendment to the soil to improve its ability to hold water.
Starting with the sign_up.php file I noticed that there was an obvious case of username enumeration. Because of their use of
mysql_real_escape_string, SQL Injection was unlikely. The SQL query, however, was constructed with the use of the
LIKE operator, rather than
= operator. This allowed us to use the wildcard
'%' to match any user within the application.
Step 3: Username Enumeration
I attempted to sign up with the user ‘%’, which resulted in a unique error message, thanks to the username enumeration vulnerability:
This response indicates that there is a user named _
FLAG _ in the system – if that couldn’t be more obvious ;)
Step 4: Bypass the Authentication Logic
Now, with access to a username we still needed to discover how we can authenticate. First instinct is to try to login with the known username and a common password such as ‘1234.’
The response simply indicated: “Not Authorized,” which wasn’t really helpful. With access to the source code it made sense to determine what was occurring behind the scenes.
The authentication portion included the flag.php file, which was not contained within the downloaded source code. Essentially, there is a validate function, which if bypassed, would provide the flag.
$pass to be an MD5 hash, not a plaintext password.
If the password length matches, the script proceeded to a character-by-character comparison of the password and the users hash. In the event that the character matched, the script slept for 300,000 microseconds. This is a timing condition we could use to enumerate the password hash.
Step 5: Enumerating the Hash
Leveraging Burp Suite we captured a sign in request and replayed it via Repeater. Because we were dealing with a timing condition, it was important to take notice of the response time.
The normal response indicated a time of approximately 1,000 milliseconds. We proceeded to change the first character of the hash, iterating through all hexadecimal values until one had a noticeably different time.
The response time appeared to increase by about 300 milliseconds, which indicated that the first character of the hash was ‘6’. We continued to do this for the next character, too.
Eventually we discovered that the next character again, was 6. The current response time was about 600 milliseconds larger than normal, which is what we expected. We continued this approach for each character in the hash, until we received the flag.
Eventually the system responded with the flag gr0wth__h4ck!nG!1!1!