OWASP Juice Shop

level 2

Basket Access

Access someone else’s basket.

Pretty simple, when you click on your basket a request goes out like this,

GET /rest/basket/5 HTTP/1.1

Intercept and modify the request or modify and replay the request (with headers, there’s some authorization here) with a value other than 5.


Christmas Special

Order the Christmas special offer of 2014.

Earlier I noticed that juice-shop.min.js contains an occasionally hilarious nesting of catch statements and logging to the JS console. For instance, from the SearchResultController controller,

              }).catch (function (e) {
            }).catch (function (e) {
          }).catch (function (e) {

I’ve kept the console open hoping to catch such output and it was indispensable for this challenge. Submitting a single tick to a search box is on the “definitely always try it” list but it didn’t work here. A single tick followed by practically anything, however, throws a nice SQLite error into the console. A search for 'foo, for example…


So we know we’re working with the following SQL statement, where <> is the user input.

SELECT * FROM Products WHERE ((name LIKE '%<>%' OR description LIKE '%<>%') AND deletedAt IS NULL) ORDER BY name

We’d like to remove the part about deletedAt, with the hopes that ‘deleted’ items are actually still in the database just with this column as a non-null to mark removal. Even better, it would be great if the 2014 Christmas product is such an item.

A tick to close the quotes and two parenthesis to close them. Follow with a comment to get rid of the rest, like this '))--.

The database receives this pile of weirdness,

SELECT * FROM Products WHERE ((name LIKE '%'))--%' OR description LIKE '%'))--%') AND deletedAt IS NULL) ORDER BY name

But only cares about,

SELECT * FROM Products WHERE ((name LIKE '%'))

Sure enough, in the results page after searching '))--,


The normal buttons on the product listing are broken and we can’t click to add it to the cart. To feel out adding it by another means, observe the request when a regular item is added.

POST /api/BasketItems/ HTTP/1.1


So, we might just need the ProductId of the Christmas item. Looking back at the search results, the item above is #9, the item below doesn’t work either, and the one below that is #12. Maybe it’s just 9, 10 (xmas), 11, 12? Replaying the above POST with a ProductID of 10 - bingo.


From here the basket appears to function normally and an invoice is generated after clicking the checkout button.



Deprecated Interface

Use a deprecated B2B interface that was not properly shut down.

Solving this one relies totally on having done a thorough job clicking through the application and looking at the source of each page. On the complaint form, the file uploader has some attributes set to ‘.pdf’ but ‘.pdf,.xml’ on another.

<input ngf-select="" ng-model="file" id="file" name="file" ngf-pattern="'.pdf,.xml'" ngf-accept="'.pdf'" ngf-max-size="100KB" class="ng-pristine ng-untouched ng-valid ng-empty" accept=".pdf" type="file">

The end result is that the file selection dialog which opens is limited to PDF files by default, but the server accepts PDF or XML submissions.


Using my favorite sad test file,


The upload succeeds and triggers challenge completion.


Five-Star Feedback

Get rid of all 5-star customer feedback.


Not much going on here. Go to the admin page we found in level 1 at /#/administration and click to delete the 5-star reviews. There were only a few for me and I think most were from my own experimenting earlier.


Login Admin

Log in with the administrator’s user account.

We know the administrator’s email address from the previously discovered admin page.


This challenge was a good lesson in thinking about assumptions and getting stuck with tunnel vision. Because I had the email address, I focused all effort on finding some kind of injection in the password field only. This ended up being totally fruitless and I wasted a bunch of time without even an error response to show for it. The simplest possible trick in the email field is all I needed - the classic single tick.


We can see why injecting the password field failed; the password appears to be hashed by the client before inclusion in SQL. D’oh.

SELECT * FROM Users WHERE email = '<user>' AND password = '<hash>'

There’s not much we can do with the password field being hashed. Whatever value we enter, the SQL server is just going to get a string of letters and numbers. We can try getting rid of the statement after the username with a comment, though, with the username admin@juice-sh.op'-- and any password.


Login MC SafeSearch

Log in with MC SafeSearch’s original user credentials without applying SQL Injection or any other bypass.

The hovertext hint on the scoreboard has you find this pretty amazing YouTube video.

First time through this caught my eye, but it doesn’t work.


After a more careful listening, he says his password is the name of his dog, Mr. Noodles, and that he likes to change out O’s for zeros. I’d been using Burp Repeater to make guesses, eventually…

POST /rest/user/login HTTP/1.1

{"email":"mc.safesearch@juice-sh.op","password":"Mr. N00dles"}


Password Strength

Log in with the administrator’s user credentials without previously changing them or applying SQL Injection.

I was not able to guess this one and the password did not appear in the Burp list, Nmap list, or the first 50K or so entries of the rockyou list. So much for easily brute-forced or guessed, oops.

Finding the hash turned out to be very easy.


The request which populates the information above looks like this.

GET /api/Users/1 HTTP/1.1

And the response,

HTTP/1.1 200 OK


The best way to crack easy hashes is by Google’ing them and we find that ‘admin123’ has the MD5 hash 0192023a7bbd73250516f069df18b500.


Out of curiosity I looked in rockyou and was surprised how far down the list the first three of these are.

root@kali /u/s/wordlists# grep -n admin123 rockyou.txt 

Security Policy

Behave like any “white-hat” should.

Access the site’s security.txt file. Looking at securitytxt.org, I wasn’t aware you’re supposed to put things in a .well-known directory, fortunately for me this is not the case in Juice Shop.



Weird Crypto

Inform the shop about an algorithm or library it should definitely not use the way it does.

I submitted the comment “MD5 is shit!” and well, yea that did it.