Level Up Coding

Coding tutorials and news. The developer homepage gitconnected.com && skilled.dev && levelup.dev

Follow publication

Cracked Intigriti XSS Challenge 0223 by Dr. Leek

--

Challenge Walkthrough

So, I decided to hunt on Intigriti and fortunately, I found this exciting Challenge 0223 by Dr. Leek. Upon entering the challenge, there was a functionality to customize your NFT and upload your own background.

After uploading the background image, it was discovered that the website was utilizing the exif-js library to extract metadata from the image and then display it within the web application.

While examining the code at line 42, it appears that we have the ability to manage two variables: ‘strcol’ which refers to ‘DateTimeOriginal’, and ‘strval’ which pertains to ‘UserComment’, both of which are extracted from the uploaded image.

Looking at the source code on line: 53–55 it’s found that all of the fields (comment, owner, created at) has been rendered using DOMPurify.sanitize() so there's no chance we can inject our malicious payload to execute javascript but there's one field image name on line: 52 which is not getting sanitized.

As we know that imgObj is initially string and on line: 43 it gets parsed, therefore we can inject our own payload into any of strcol or strval variable to change the property imgName from within the JSON because if there are multiple properties of the same name javascript JSON.parse() tends to go for the last one and ignore the first one.

Payload: hamza","imgName":"<img src=x onerror=alert(document.domain)>"

After parsing the JSON using JSON.parse() we'll get:

Overwritten our payload to imgName attribute

Now, as we had build the roadmap for ourselves, let’s put it to the test. We can use exiftool to contaminate the image metadata (User Comment or Date/Time Original) by our xss payload. I decided to go for the user comment.

Exif Command To Inject XSS Payload:

$ exiftool -UserComment='test","imgName":"<img src=1 onerror=alert(document.domain)>' NFT.jpg
Injected payload to image using exiftool

Then after we upload our image to the website, and view the image, the temp.imgName will contain our payload which is then rendered inside HTML using namfield.innerHTML = "Image name: " + temp.imgName; as shown in the screenshot below:

Hence the payload we injected will pop an alert results in Dom-Based Cross-Site Scripting:

BOOM!!

--

--

Written by Hamza Avvan

Senior Security Analyst @Accenture CFC Prague - Bug Bounty Hunter❤️ Follow me on twitter: https://twitter.com/hamzaavvan

No responses yet