Post

Webverselabs Ciphered Cart Challenge File Upload

Webverselabs Ciphered Cart Challenge File Upload

Scenario :

NovaStore is a direct-to-consumer skincare brand out of Portland that did roughly $14M in 2024 and got publicly embarrassed by a credential leak the year before. The remediation work was assigned by ticket count rather than risk, and the promo-code endpoint — owned by a junior who joined two weeks before the hardening sprint — got the smallest checkbox: a throttle in front of the form and a note that “the rest can wait for Q2.” Q2 came and went.

Solution :

image

When enumeraing the application , we find 2 parameters being used , the first one is category :

image

I tried multiple SQLi payloads on this parameter but it appears to be well secure , i even used sqlmap but nothing came out of it .

image

The second parameter i found was the one used to fetch for products :

image

Same thing i tried multiple SQLi payloads , used sqlmap but didn’t get anything out of it .

image

If we check our Burp History ,when we click on cart , we make a POST request to /cart.php .

image

I used sqlmap again to inject inside this post request but got nothing .

image

Now let’s try and make a purchase , first we see the coupon field :

image

If we enter anything , it gets sent as a POST request to the /apply_promo endpoint :

image

Now let’s try and use sqlmap to inject inside this request .

image

Perfect , the code parameter is indeed vulnerable , now let’s dump the databases then tables , and get out flag.

image

Since it is time based , it might take a bit too long to get the flag . That’s all for this challenge :)

This post is licensed under CC BY 4.0 by the author.