Race Condition in Flag Submission

Disclosed: 2019-07-22 17:29:52 By dropper To security
Low
Vulnerability Details
**Summary:** This report describes a Race Condition Vulnerability which allow an authenticated user to submit the same Flag multiple times. Increasing the user points and therefore the chances to get an invitation to a private program. ### Steps To Reproduce To reproduce this bug, you need to: 1. Login with a valid user account 2. Solve one of the challenges and get a Flag. It can be the Trivial one (worth 1 point). 3. Go to the submit page, put the Flag that was found and intercept the POST request that is sent during the Flag submission. You can use Burp Suite for that, for example. 4. Then, you just have to submit the POST several times in a short time frame. I recommend a script with multi threads or "Race The Web" tool that I will mention below. 5. Enjoy your extra points with the same flag. ### Tool Used During PoC To the PoC I used "Race The Web", available at: https://github.com/insp3ctre/race-the-web With this tool we can send the requests faster than we could with Burp Intruder. Getting better results. ### Supporting Material/References (Screenshots) The outcome is shown below: {F385429} I've used the Trivial Flag 70 times and earned 2 invitations. ### Note I've created a new user to do this PoC. In case you want to delete, the e-mail is: ███████ ## Impact An attacker could use this Race Condition vulnerability to earn extra points and increase the chances to get invited to a private program without the need to solve other chalanges available.
Actions
View on HackerOne
Report Stats
  • Report ID: 454949
  • State: Closed
  • Substate: resolved
  • Upvotes: 80
Share this report