Reverse Engineering ShopGoodwill for Fun and Profit
I’ve recently re-discovered the sheer amount of great stuff that can be found both in physical thrift stores and on ShopGoodwill. If you’re unfamiliar, it’s Goodwill’s online auction platform. Like most Internet services that I interact with, I’d love to use it in an automated fashion, but they don’t make their API documentation public. That’s no matter at all, but reversing some webapp wouldn’t be a good enough topic for me to blog about. Instead, I’m going to talk about the weird stuff that goes on interfacing with ShopGoodwill’s site.
That said - the scripts that I’ve written for interacting with ShopGoodwill can be found here, if you’re interested in getting cron-scheduled query digest updates or bid sniping.
When I started writing “bid_sniper”, I of course recognized that I needed to log in programmatically. So, I fired up my browser’s network console and sent my credentials to their login page. And… that’s weird. It’s a simple REST login endpoint, but it looks like the username and password are encoded. Of course, the encoded credentials shown here aren’t valid.
Hmm, ok, no trailing equals sign, and there’s a % in the username, so I guess it’s not base64 encoded. What the hell is going on here? And why? Also, I’m just not going to question how “clientIpAddress” is sourced or used. Seems broken, and I don’t care.
So, first off, I tried logging in several times with the same credentials. The output was consistent, and all authentication attempts succeeded. So I assume that it’s using some non-standard encoding scheme that I’m not aware of.
I have to note, at this point, there’s no need for me to figure out what’s going on here. I can log in programmatically, I’ll just have to get my encoded credentials from the site before I can plug them into my config file. But that’s no fun.
When loading the sign-in page, I see six JavaScript scripts being downloaded - four of which from shopgoodwill.com. Let’s start with those.
“main.js” is the largest script by far - 1.63 MB compared the rest, which are all smaller than 200 kB. What’s in it? A lot, it turns out. So, as you do, I downloaded and prettified it. It’s still minified, but there’s a lot of useful stuff we can figure out without having to reverse most of it.
Ok… “encryption”, huh? Searching for “encryptModelValue” eventually brought me to this fun block of code.
Nice IV. Even with obfuscated variable names, this is pretty readable. Given “e”, the plaintext value, the function encrypts it (after being URL-encoded) with some secret key and a useless IV with AES-CBC.
Another great choice for a random value. Cool! Lets see if either of them work. Turns out the second one was valid, as expected. You can see my Python implementation here.
So, with the mystery solved, I have to ask - why? Why are they doing this? What benefit does “encryption” like this add at all, if any? Whatever the answer, it’ll just be conjecture. I’ve seen many other questionable things in the ShopGoodwill API that made me gauge the competency of the designers - see my comments in the aforementioned Github repo if you’re looking for examples.