Intigriti April 2025 Challenge

Overview

This writeup covers my approach to solving the Intigriti “HackDonalds” challenge. The challenge involved finding a flag on the hackdonalds.intigriti.io website, which ultimately required exploiting two distinct vulnerabilities:

  1. Next.js Middleware Authorization Bypass (CVE-2025-29927)
  2. XML External Entity (XXE) Injection

Reconnaissance

Upon visiting the website, I was able to see the Home page with a fast food parody site called “HackDonalds” with some security-themed Menu items like “SQLi Sundae” and “RCE Shake.”

CleanShot 2025-04-12 at 15.06.16.png

CleanShot 2025-04-12 at 15.07.20.png

HackDonalds Homepage

The site had several accessible pages:

Examining the HTTP headers of the site’s responses showed:

X-Powered-By: Next.js

This revealed that the site was built using the Next.js framework, which would become relevant later in the exploit chain.

CleanShot 2025-04-12 at 15.09.30.png

Vulnerability #1: Next.js Middleware Authorization Bypass (CVE-2025-29927)

Discovery