WannaRace - WebApp Intentionally Made Vulnerable To Race Condition For Practicing Race Condition
2022-1-11 11:30:0 Author: www.kitploit.com(查看原文) 阅读量:5 收藏

WebApp intentionally made vulnerable to Race Condition

Description

Race Condition vulnerability can be practiced in the developed WebApp. Task is to buy a Mega Box using race condition that costs more than available vouchers. Two challenges are made for practice. Challenge B is to be solved when PHPSESSID cookie is present, cookie is auto created when user is logged in. Happy learning

Building and running the docker image

Build the docker image with:

git clone https://github.com/Xib3rR4dAr/WannaRace && cd WannaRace
docker build -t xib3rr4dar/wanna_race:1.0 .

Run docker image:

docker run -it --rm xib3rr4dar/wanna_race:1.0

OR

docker run -it --rm -p 9050:80 xib3rr4dar/wanna_race:1.0

Then open in browser relevant IP:PORT

Challenge #1

Main Page

Four vouchers worth 400 units available for recharge

Task is to buy Mega box (which is worth 401 units) by exploiting race condition

Challenge #2

Same as Challenge #1 but requires login so that PHPSESSID and appropriate cookies are set


WannaRace - WebApp Intentionally Made Vulnerable To Race Condition For Practicing Race Condition WannaRace - WebApp Intentionally Made Vulnerable To Race Condition For Practicing Race Condition Reviewed by Zion3R on 8:30 AM Rating: 5


文章来源: http://www.kitploit.com/2022/01/wannarace-webapp-intentionally-made.html
如有侵权请联系:admin#unsafe.sh