webProeasy

Lanternfall

neurogrid

Task: Next.js web app with nginx, hidden admin panel, hardcoded JWT secret in frontend JS, and command injection via SQLite .output filename parameter. Solution: Discover routes via _buildManifest.js, extract JWT secret from admin JS chunk, forge admin token, exploit OS command injection in report filename with ${IFS} whitespace bypass to read the flag.

$ ls tags/ techniques/
nextjs_build_manifest_route_disclosurehardcoded_jwt_secret_in_frontend_jsjwt_forgery_privilege_escalationsqlite_output_command_injectionwhitespace_filter_bypass_with_ifsfile_exfiltration_via_admin_api

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups