Back to list
CTFVery Easy
HackThisSite — Basic Mission 5
ducky
2026-05-19
18 views
1 min read
HackThisSite — Basic Mission 5
What Happened
Sam tried to secure the email script further, but the recipient address is still controlled by a hidden form field:
No actual server-side validation was added.
Exploit
Identical to Basic 4:
- Open DevTools → Inspector
- Find the hidden
toinput - Replace value with your HTS registered email
- Click "Send password to Sam"
- Password arrives in your HTS inbox
Root Cause
Security was claimed but not implemented. The "extra measures" didn't address the actual vulnerability — client-controlled recipient in the form payload.
Key Takeaway
Security through obscurity or minor tweaks doesn't fix a fundamental design flaw. If the root cause (client-controlled sensitive input) isn't fixed, the exploit still works.
Tags
#hackthissite#/missions/basic/5/#basic-mission-5
Keep Reading