Hintru ENES ← Todos los labs

Cheesy Does It — Business Logic Discount Abuse (Bugforge)

EN easy CTF challenge Business LogicJSON Array InjectionCoupon AbuseParameter TamperingBurp Suite

A pizza-ordering web application on Bugforge gives registered users a single-use discount code. The flag goes to whoever can apply more discount than they should — the fix is one HTTP request away, but you'll need to think carefully about how the server interprets the input you send.

0/4
resueltos
👁 Paso 1 Paso 2 Paso 3 Paso 4
web

Paso 2 · Intercept the Purchase POST Request

Objetivo: Begin a pizza purchase, apply the PIZZA-10 discount code at checkout, and intercept the resulting HTTP POST request with Burp Suite to inspect the full request body.

Contexto: With Burp Suite configured as your proxy, walk through the purchase flow and apply the discount code when prompted.

Pistas progresivas

Revela solo las que necesites. Claude lleva la cuenta de cuántas usaste para calibrar la retroalimentación.

Pista 1 — empujón direccional

Set up Burp Suite to intercept traffic, then go through the checkout process and apply the discount code — stop the request before it reaches the server.

Pista 2 — técnica / clase de vuln

Look at the raw POST request body. There should be a JSON parameter specifically for the discount code alongside other order parameters like item name and toppings.

Pista 3 — casi la solución

In the intercepted POST request you will see a JSON body containing a `discount` field (set to `"PIZZA-10"`) and a `toppings` field that is already formatted as a JSON array (e.g., `["item","item"]`).

Tu intento