Security Misconfiguration

Challenges covered in this chapter

Challenge Difficulty
Provoke an error that is not very gracefully handled. :star:
Access a salesman's forgotten backup file. :star::star::star::star:
Reset Morty's password via the Forgot Password mechanism with his obfuscated answer to his security question. :star::star::star::star::star:
Log in with the support team's original user credentials without applying SQL Injection or any other bypass. :star::star::star::star::star::star:

Provoke an error that is not very gracefully handled

The OWASP Juice Shop is quite forgiving when it comes to bad input, broken requests or other failure situations. It is just not very sophisticated at handling errors properly. You can harvest a lot of interesting information from error messages that contain too much information. Sometimes you will even see error messages that should not be visible at all.

Applications can unintentionally leak information about their configuration, internal workings, or violate privacy through a variety of application problems. Applications can also leak internal state via how long they take to process certain operations or via different responses to differing inputs, such as displaying the same error text with different error numbers. Web applications will often leak information about their internal state through detailed or debug error messages. Often, this information can be leveraged to launch or even automate more powerful attacks.1


  • This challenge actually triggers from various possible error conditions.
  • You can try to submit bad input to forms to provoke an improper error handling
  • Tampering with URL paths or parameters might also trigger an unforeseen error

If you see the success notification for this challenge but no error message on screen, the error was probably logged on the JavaScript console of the browser. You were supposed to have it open all the time anyway, remember?

Access a salesman's forgotten backup file

A salesperson as accidentally uploaded a list of (by now outdated) coupon codes to the application. Downloading this file will not only solve the Access a salesman's forgotten backup file challenge but might also prove useful in another challenge later on.


  • Analyze and tamper with links in the application that deliver a file directly.
  • The file is not directly accessible because a security mechanism prevents access to it.
  • You need to trick the security mechanism into thinking that the file has a valid file type.

Reset Morty's password via the Forgot Password mechanism

This password reset challenge is different from those from the Broken Authentication category as it is next to impossible to solve without using a brute force approach.

A brute force attack can manifest itself in many different ways, but primarily consists in an attacker configuring predetermined values, making requests to a server using those values, and then analyzing the response. For the sake of efficiency, an attacker may use a dictionary attack (with or without mutations) or a traditional brute-force attack (with given classes of characters e.g.: alphanumerical, special, case (in)sensitive). Considering a given method, number of tries, efficiency of the system which conducts the attack, and estimated efficiency of the system which is attacked the attacker is able to calculate approximately how long it will take to submit all chosen predetermined values.2


  • Finding out who Morty actually is, will help to reduce the solution space.
  • You can assume that Morty answered his security question truthfully but employed some obfuscation to make it more secure.
  • Morty's answer is less than 10 characters long and does not include any special characters.
  • Unfortunately, Forgot your password? is protected by a rate limiting mechanism that prevents brute forcing. You need to beat this somehow.

Log in with the support team's original user credentials

This is another follow-the-breadcrumbs challenge of the tougher sort. As a little background story, imagine that the OWASP Juice Shop was developed in the classic style: The development team wrote the code and then threw it over the fence to an operations and support team to run and troubleshoot the application. Not the slightest sign of DevOps culture here.


  • The support team is located in some low-cost country and the team structure fluctuates a lot due to people leaving for jobs with even just slightly better wages.
  • To prevent abuse the password for the support team account is very strong.
  • To allow easy access during an incident, the support team utilizes a 3rd party tool which every support engineer can access to get the current account password from.
  • While it is also possible to use SQL Injection to log in as the support team, this will not solve the challenge.

results matching ""

    No results matching ""