webProeasy
Lanternfall
neurogrid
Task: Next.js web app with nginx, hidden admin panel, hardcoded JWT secret in frontend JS, and command injection via SQLite .output filename parameter. Solution: Discover routes via _buildManifest.js, extract JWT secret from admin JS chunk, forge admin token, exploit OS command injection in report filename with ${IFS} whitespace bypass to read the flag.
$ ls tags/ techniques/
sqlitecommand_injectionjwtinformation_disclosurenginxprivilege_escalationnextjshardcoded_secretifs_bypass
nextjs_build_manifest_route_disclosurehardcoded_jwt_secret_in_frontend_jsjwt_forgery_privilege_escalationsqlite_output_command_injectionwhitespace_filter_bypass_with_ifsfile_exfiltration_via_admin_api
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]board_of_secrets— miptctf
- [web][Pro]Lab 248 — PulseBoard — Next.js Middleware Authorization Bypass— hackadvisor
- [web][Pro]Lab 113 — CloudNest— hackadvisor
- [web][Pro]Lab 12 — NewsGrid — JWT Algorithm Confusion— hackadvisor
- [web][Pro]Board of Secrets Revenge— miptctf