Status: ✅ Completed
Platform: Hack The Box – Machine
Write-up: Redacted until/unless HTB allows public solutions.
A slick Django social app with one critical mistake: server-side template data rendered inside a “likes” fragment. That sink, paired with an IDOR, exposes credentials for a real system user; from there, a world-writable Django file cache enables a pickle deserialization hop to the web user. Final escalation comes from encrypted DB backups left with their GPG key—crack the passphrase, decrypt, and you’re holding the route to root.
/var/tmp/django_cache is world-writable → replace a fresh cache file with a pickle payload → code exec as the web app user.
HackNet: pwned.
No payloads or credential values are published here by design. If HTB permits public walkthroughs in the future, I’ll release a full write-up with defensive guidance.