admin.blazorized.htb


Successfully bypassed the authentication to the admin panel at admin.blazorized.htb, with a forged/tampered JWT

Ironically, the dashboard claims that the admin panel doesn’t use the API endpoint, but rather interact directly with the backend DB for “security purpose”

Manage Posts & Categories


Both /manage-posts and /manage-categories endpoints allow editing and deletion of posts and categories

Create Posts & Categories


Creating Posts and Categories are possible through the endpoints; /create-posts and /create-category

SQLi?


There is an endpoint where it accepts an user input to check for a title. Since it’s mentioned in the dashboard that the admin panel interacts directly with the backend DB, this seems to suggest that there might be an SQL injection vulnerability here

The backend DB is MSSQL according to the Nmap scan result earlier.

One of the MSSQL testing payloads for blind SQLi worked; '; if not((select serverproperty('isintegratedsecurityonly')) <> 0) waitfor delay '0:0:2' -- The web server took 10 seconds to respond

Moving on to the Exploitation phase