Files
darkly/weak_cookie_auth

Weak auth via cookie

How We Found It

On all the pages, if we have no cookies, the website gives us a cookie. the cookie is called i_am_admin and has this value :

68934a3e9455fa72420237eb05902327

That look like a md5 hash. what if I decrypt it.
this is a hash of false.
what if I hash true and set it as the cookie.
when I do this. on all pages, there is an alert that gives me the flag

Utility of It

  • Allows an attacker to forge an admin session by reverse-engineering or guessing cookie values.
  • No need to log in or brute-force credentials — just manipulate a hash.
  • Can lead to privilege escalation, access to admin features, or flag retrieval in CTFs.

How Can We Patch It

  • Never rely on easily reversible or guessable values (like md5("true")) for auth.
  • Use secure session tokens, randomly generated and validated server-side.
  • Store roles (like admin/user) in a server-side session — not in a modifiable cookie.
  • Avoid using MD5 for any security-related checks; it's outdated and weak.
  • Sign cookies with a HMAC or encrypt them if you must store data client-side.