Web - Hardy
No source code was provided
Solution
The parameter names are vulnerable to SQL Injection
Dumping the admin password
ILIKEpotatoesSOMUCH::&& is the password for the admin
the password also is being used as a JWT secret and the application is vulnerable to SSTI {'type':'{{<payload>}}'}
The Flag
Last updated