🟢Learning Objective 4
Task
In the Attack Lab:
Find and exploit the LFI vulnerability in resources app https://resourcespharmacorp.azurewebsites.net/
Extract the information from the Application settings
Applies to: Attack Lab
Topics Covered: LFI Vulnerability Exploitation and Information Extraction
On the previous task we have found some endpoints, after investigating we have a ASPx webapp on the URL:
https://resourcespharmacorp.azurewebsites.net

Scroll down and click on : Download Brochure

A new window opens and if we check the URL and the end, it is possible to read files.

Since is an ASPx app let's try to read the file:
WEB-INF/web.xml
https://resourcespharmacorp.azurewebsites.net/main?action=getData&fileName=WEB-INF/web.xml

After reading ther file we have found a ClientSecret.
ClientSecret - 7e7730b1-29ab-4adf-bb20-7ae61987d01f:~9j8Q~f339gnUfSBxSO5yuQXM6ztfCBL8LPjXa3I
Lessons Learn
After enumerating one resource we found the LFI vulnerability and it was possible to read the ASPx file WEB-INFO/web.xml and read a ClientSecret.
Last updated
Was this helpful?