Smug-Dino

Description

Don't you know it's wrong to smuggle dinosaurs... and other things?

Author: rollingcoconut

Application: http://web.csaw.io:3009/arrow-up-right

Analysis

Smug-Dino-1

The application has 3 routes: home, hint and flag.

If we request the flag we are redirected to localhost.

Hint:

Smug-Dino-2

If we enter nginx and 1.17.6 we are redirected to /succeed_hint:

Doing a quick google dorking query with known keywords: "cve" "2019" "nginx" "1.17.6" I found CVE-2019-20372: nginx Error Page request smugglingarrow-up-right

Smug-Dino-3

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.

PoC demonstration: https://youtu.be/jimGQpftYWsarrow-up-right by vulnmachinesarrow-up-right.

Solution

Here you can see I'm making request with BurpSuite, most headers are not important and hence have been removed for exploit. It's important that first request connection is "keep-alive" so we can smuggle second (or more) requests.

Smug-Dino-4
circle-check

Last updated