Official discussion thread for Secure Server. Please do not post any spoilers or big hints.
Great challenge! Challenging to play in blue.
Indeed, but I’m stuck in the vulnerability 1. Can I get some hints or something? Thx guys.
i am sure that i have both php var and javascript sanitized but still have the 2 vulnerabilities present… very strange
ok found for the first one .
…and the second one
i am so noob, no idea what am i looking for ? LFI but i have to fix this, no idea about it.
search about how to secure php code with the functio ns namesthat are used in this code.
ok got it.
I’ve been stuck on the first vulnerability of secure server for a long time… can anyone give a hint to the area of the code that needs to be fixed. I quickly corrected vuln 2 so i am probably just over thinking it. I am assuming both vulns are in the our-projects.php file. The thing that is odd to me is that the exploit.py is taking advantage of an un-sanitized user-agent string but the UA is not being processed in the webapp its being processed in the backend/Access.log… any help would be appreciated.