Skip to content

Latest commit

 

History

History
45 lines (28 loc) · 1.54 KB

kbid-XXX-Info-leakage-comments.md

File metadata and controls

45 lines (28 loc) · 1.54 KB

KBID XXX - Information Leakeage in Comments (info-leakeage-comments)

Running the app Java

First make sure java is installed on your host machine. After installation, we go to the folder of the lab we want to practice. "i.e /skf-labs/XSS, /skf-labs/RFI/" and run the following command:

$ ./mvnw spring-boot:run

{% hint style="success" %} Now that the app is running let's go hacking! {% endhint %}

Reconnaissance

It is very common, and even recommended, for programmers to include detailed comments and metadata on their source code. However, comments and metadata included into the HTML code might reveal internal information that should not be available to potential attackers. Comments and metadata review should be done in order to determine if any information is being leaked.

When we start the application we can see that there is a login form.

Exploitation

What we are going to do is explore and check the source code of the website in order to find some useful information that the programmer may have forgotten in the source code.

We found something promising! Now, we try these words as the credentials in the login form:

And goal achieved!

Additional sources

{% embed url="https://www.owasp.org/index.php/Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005)" %}