Comment on page
Python - GraphQL Mutations
$ sudo docker pull blabla1337/owasp-skf-lab:graphql-mutation
$ sudo docker run -ti -p 127.0.0.1:5000:5000 blabla1337/owasp-skf-lab:graphql-mutation
Now that the app is running let's go hacking!
The application implements a very basic mutation to create a new post on the blog. The mutation used is the following

mutation {
createPost(input: {body: "' -- ", title: "test_title", authorId: 2}) {
post {
body
authorId
title
}
}
}

If we look at the code we have a class
CreatePost
that will implement our logic to create a post.class CreatePost(graphene.Mutation):
"""Mutation to create a post."""
post = graphene.Field(lambda: PostObject, description="Post created by this mutation.")
class Arguments:
input = CreatePostInput(required=True)
def mutate(self, info, input):
post = Post(**input)
db.session.add(post)
db.session.commit()
return CreatePost(post=post)
The method mutate will just get the new Post object and insert an instance in the database.
There are many ways we could exploit this, one would be to create posts as another user:

Bingo! We have create a new post as another user. Let's refresh the page:

You could, of course, achieve the same goal with burp. What else can you exploit using this vulnerability?
Last modified 8mo ago