Hintru ENES ← Todos los labs

Cheesy Does It — Business Logic Discount Abuse (Bugforge)

EN easy CTF challenge Business LogicJSON Array InjectionCoupon AbuseParameter TamperingBurp Suite

A pizza-ordering web application on Bugforge gives registered users a single-use discount code. The flag goes to whoever can apply more discount than they should — the fix is one HTTP request away, but you'll need to think carefully about how the server interprets the input you send.

0/4
resueltos
👁 Paso 1 Paso 2 Paso 3 Paso 4
recon

Paso 1 · Register, Log In & Identify the Discount Code

Objetivo: Create an account, log in to the application, and locate the discount code that is presented to you after authentication.

Contexto: The target is a Bugforge pizza-ordering web application. You need a valid account to proceed through the purchase flow.

Pistas progresivas

Revela solo las que necesites. Claude lleva la cuenta de cuántas usaste para calibrar la retroalimentación.

Pista 1 — empujón direccional

After logging in, look around your account dashboard or the checkout area for any promotional information the app surfaces automatically.

Pista 2 — técnica / clase de vuln

Applications often display coupon or discount codes on the landing page or in the user dashboard after login — check for any banner, label, or text that looks like a promo code.

Pista 3 — casi la solución

The discount code displayed to you after login is PIZZA-10. Note it down; you will inject it into the purchase request.

Tu intento

Solución oficial

Register a new account and log in. The application displays the discount code PIZZA-10 on the post-login screen. Note this code for use in the purchase flow.

Criterio de validación: Student registers, authenticates, and records the coupon code PIZZA-10 from the application UI.

Intentos recientes en este paso

revealed 2026-04-12 10:13:38 · pistas: 3
[solution revealed]

Solution revealed