CyberKavach QuestCon Series: Hawkins Laboratory Research Portal (BOLA Challenge)

Hawkins Laboratory Research Portal (BOLA Challenge)


Welcome back to the CyberKavach QuestCon write-up series! The PCCOE OWASP Student Chapter presents a walkthrough for the Hawkins Laboratory Research Portal challenge, a demonstration of Broken Object Level Authorization (BOLA) vulnerabilities in Stranger Things style.

Author: Aaryan Bhujang


Challenge Overview

  • Category: Web Application Security

  • Vulnerability: Broken Object Level Authorization (BOLA)

  • Theme: Stranger Things, Hawkins Laboratory

  • Objective: Exploit BOLA to access classified research notes and retrieve two unique flags.


Initial Reconnaissance

  1. Register a new user account.


POST /auth/register

Content-Type: application/json

{

  "username": "user",

  "password": "qwertyuiop"

}


  1. Login to obtain a JWT token.

POST /auth/login

Content-Type: application/json

{

  "username": "user", 

  "password": "qwertyuiop"

}



Portal Exploration

  • The portal has a dark Stranger Things theme, displaying 6 research projects.

  • Each project is led by a researcher: Dr. Eleven, Dr. Dustin, Dr. Max, Dr. Will, Dr. Mike, Dr. Lucas.

  • Each researcher’s name is clickable.


Target Discovery

  • Test each clickable name.

    • /users/eleven and /users/dustin are valid.

    • Others return 404 errors.

  • Only “Eleven” and “Dustin” have accessible researcher profiles.


API Reconnaissance & Bypassing Newer Defenses

  • Inspect network requests when clicking a researcher.

    • Notable endpoint: /api/v2/users/eleven (secured, only public data shown).

  • Try accessing an older API version: /api/v1/users/eleven with JWT token.


BOLA Vulnerability Exposed

  • Key Finding: /api/v1/users/eleven grants unauthorized account access.

  • Use JWT token in Authorization header.

  • The response leaks private user details, including researcher username and role.


Flag Extraction: Elevent’s Account

  • Call /api/v1/notes after pivoting to Eleven’s account.

  • The response includes the first flag.



Flag Extraction: Dustin’s Account

  • Repeat: pivot to /api/v1/users/dustin, then call /api/v1/notes.

  • The response includes the second flag.


Summary of Exploit Flow

  1. Register/login to get your JWT.

  2. Use valid researcher profile URLs to force role pivot using /api/v1/users/{target}.

  3. Directly access /api/v1/notes to receive notes for the current (now pivoted) account.

  4. Exfiltrate both flags.


Attack Flow: Why It Works

  • The BOLA vulnerability allows users to escalate privileges and access other users’ sensitive data.

  • No authorization checks in the v1 users endpoint means anyone can impersonate any other valid user by calling /api/v1/users/{id} then /api/v1/notes.


Key Insight

Modern API designs often deprecate older endpoints but fail to properly restrict them, leaving serious vulnerabilities open. Always audit for direct object reference paths and legacy endpoints during app assessments.


Congratulations to all solvers who exposed the secrets of Hawkins Lab and leveraged classic BOLA for maximum impact!


Comments

Popular posts from this blog

CyberKavach QuestCon Series: Upside-Down Vault

From Open Networks to Safe Systems: How Firewalls Block the Hacker’s Doorway

CyberKavach QuestCon Series: VecNet