Rating: 5.0
# Watermelon Writeup
- **Category:** Web
- **Points:** 120
- **Difficulty:** Easy
## Challenge Description
All love for Watermelons ???
Note: The code provided is without jailing, please note that when writing exploits.
## Challenge Files
## Steps Taken
#### 1. **Registration and Login**
I navigated to `/register` and registered a user.
![image](https://github.com/user-attachments/assets/6b80c459-419c-41dc-8287-c62f437c7a09)
Next, I logged in using the newly created username and obtained the session cookie. I then copied the session cookie.
![image](https://github.com/user-attachments/assets/a6802a2d-b197-482a-b340-8e8b508fb2cd)
#### 2. **Exploration and Exploitation**
Upon analysis, I discovered that the admin password is stored in `app/app.py`. I also identified a file traversal vulnerability in the `/upload` directory.
![image](https://github.com/user-attachments/assets/bde3eb53-e89b-4c97-b309-376d940057fd)
The files are stored in `/file/1`. Initially, Burp Suite didn't reveal much, so I used `curl` to retrieve the `app.py` file. As a result, I successfully obtained the admin password.
![image](https://github.com/user-attachments/assets/23a06e81-05ee-45b8-ad8f-8b3978fc7528)
As a result, I successfully obtained the admin password.
![image](https://github.com/user-attachments/assets/b354a35e-c8ad-4a1a-8d49-dacc891046b0)
#### 3. **Gaining Access**
I logged in with the admin credentials and copied the session cookies.
![image](https://github.com/user-attachments/assets/16972424-73a8-41b4-9a71-1d60b60e3e48)
#### 4. **Flag Retrieval**
Finally, I sent a GET request to `/admin`, pasted the session cookie, and successfully retrieved the flag.
![image](https://github.com/user-attachments/assets/4acf6005-ce59-4df5-b710-f2e95fa551d9)
Would you please describe me how you discovered that the admin password is stored in app/app.py ?