Events (Web)

from flask import Flask, render_template, request, redirect
import sqlite3
import hashlib
app = Flask(__name__)
@app.route("/")
def mainHandler():
return render_template("index.html")
@app.route("/review")
def reviewHandler():
con = sqlite3.connect("events.db")
cur = con.cursor()
event = request.args.get("event")
if event == "Flag":
return ("Blacklisted term detected")
hash = hashlib.md5(event.encode()).hexdigest()
result = cur.execute("SELECT * FROM events WHERE id=?", (hash[0:6],))
try:
result = result.fetchone()
name = result[1]
except:
return (redirect("/"))
return render_template("review.html",placeholder=name,desc=result[2],img=result[3])
if __name__=="__main__":
app.run(host="0.0.0.0",port=8000,debug=False)
Step 1: Understanding the Code
Step 2: Understanding the vulnerability
Step3: Collision Brute Force Script
Step4: Exploiting the Collision

Last updated