webPromedium
Powergrid Challenge
necronet
Task: Patch a CRLF injection vulnerability in a flat-file user database that allows privilege escalation. Solution: Identify that the addUser() function lacks input validation on username, allowing pipe and newline injection to create admin entries in the pipe-delimited users.txt, then add isValidUsername() validation and deploy the fix via Socket.IO file save API.
$ ls tags/ techniques/
privilege_escalationcrlf_injectioncode_patchingwebsocket_exploitation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][free]Phoenix Pipeline— hackthebox
- [web][free]AgriWeb— hackthebox
- [pwn][Pro]Хаос на АЗС (Chaos at the Gas Station)— hackerlab
- [web][free]Prison Pipeline— hackthebox_business_ctf_2024
- [web][Pro]Resourcehub Core— necronet