How I Bypassed Voucher Limits Using a Race Condition Vulnerability
文章描述了一个CTF比赛中的Web挑战"FLAG SHOP 2.0",参与者需通过获取和验证5个相同名称的优惠券来购买旗帜。该应用限制每个用户只能获取一次优惠券。 2025-12-15 10:49:46 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Danish Ahmed

So last night I played a CTF. Of course, it was free and with no prize. I know you are not here to listen my bla bla bla about my CTF journey, but wait brooo, I’ll share.
Actually, there is a web challenge named FLAG SHOP 2.0. This challenge was HARD level for those who don’t know about this vulnerability, but let me tell you how it looks like.

Challenge Overview

In this challenge, the application allows users to:

  • Grab Voucher
  • Check Voucher
  • Buy Flag

Press enter or click to view image in full size

When you enter a name such as shadow_monarch and click on Buy Flag, the application tells you that you must collect 5 vouchers with the same name.

Press enter or click to view image in full size

Normal Behavior

First, enter the name shadow_monarch and click on Grab Vou{{Screenshot}}cher. You will receive one voucher code.

If you try grabbing another voucher using the same name, you get an error because the backend restricts this action to a single voucher per user.


文章来源: https://infosecwriteups.com/how-i-bypassed-voucher-limits-using-a-race-condition-vulnerability-8f68a19fbc76?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh