Skip to content

Commit 21d1151

Browse files
committed
update
1 parent 6ae5471 commit 21d1151

34 files changed

Lines changed: 433 additions & 0 deletions
137 KB
Loading
132 KB
Loading
1.17 MB
Loading
140 KB
Loading
78.9 KB
Loading
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
# Logic App 20 - Modify Workflow and Abuse Storage Table
2+
3+
> Modify Workflow and Abuse Storage Table
4+
5+
:::info
6+
7+
**Scenario**
8+
9+
Sometimes the user whom we compromised can have permission to edit the workflow of the logic app. Abuse the permission of the user on the logic and read the flag from the table storage.
10+
11+
**Overview**
12+
13+
What is logic app workflow?
14+
15+
A logic app workflow is a visual representation and implementation of a business process or integration scenario in Azure Logic Apps. It defines the steps, actions, and conditions that are executed in a specific sequence to automate a particular workflow.
16+
17+
**Hint**
18+
19+
- make use of the storage table connector action.
20+
21+
**Impact**
22+
23+
- With appropriate permissions in the logic app we could manipulate the logic app to interact with other services and perform malicious activity.
24+
25+
**Reference**
26+
27+
- [Logic Apps Docs](https://learn.microsoft.com/en-us/azure/logic-apps/logic-apps-overview)
28+
- [Azure table storage Docs](https://learn.microsoft.com/en-us/azure/storage/tables/table-storage-overview)
29+
- [Azure Table Storage Connector](https://learn.microsoft.com/en-us/connectors/azuretables/)
30+
31+
:::
32+
33+
同样的,题目给出了 UserCreds 信息,登陆后查看所有资源
34+
35+
![img](img/image_20260154-215412.png)
36+
37+
同样的流程,进入 Logic app 的编辑界面
38+
39+
![img](img/image_20260155-215538.png)
40+
41+
根据题目要求,在其中加入对 Azure 表储存的操作
42+
43+
指定目标的资源
44+
45+
![img](img/image_20260104-220445.png)
46+
47+
将获得的数据添加到返回中
48+
49+
![img](img/image_20260104-220453.png)
50+
51+
保存后,触发 Logic app
52+
53+
![img](img/image_20260105-220508.png)
54+
55+
:::info Flags
56+
57+
<details>
58+
59+
<summary> Which storage table logic app connector (ignore the version) did we use to fetch the flag? (Get entities or Get file content) </summary>
60+
61+
```plaintext
62+
Get entities
63+
```
64+
65+
</details>
66+
67+
<details>
68+
69+
<summary> What is the flag value we obtain ? </summary>
70+
71+
```plaintext
72+
asyjnrsp735asjdmopg735
73+
```
74+
75+
</details>
76+
77+
:::
141 KB
Loading
184 KB
Loading
131 KB
Loading
139 KB
Loading

0 commit comments

Comments
 (0)