Line CTF - 2024
x2 Web
jalyboy-baby - Web

Page with JWT, the objective is to log as admin The secret is of 32 bytes, so its not bruteforzable
Algorithm none supported, just tamper the jwt with alg = none and sub = admin


jalyboy-jalygirl - Web
Same as before, but... This time we get a jwt signed with ES256: eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJndWVzdCJ9.B2Ox_SjK9HRgAq4Td6CxATVI2bQ1rNOXovjvG1uGdh6i4UZqe5zcn7fc2EEvs0ZOtON5SIeseO2DKjjtzruq2g
Theres a vulnerability in some java versions (15-18) in which singature of ECDSA is not properly validated, here the post: https://neilmadden.blog/2022/04/19/psychic-signatures-in-java/
We can tamper the actual payload signature with: eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJndWVzdCJ9.MAYCAQACAQA
We validate that we still are guest, so its vulnerable

Then we tamper it as admin, and thats it


Last updated