ctf-writeup/2023/1337UP LIVE CTF/Pizza Time
daffainfo e6c48e50f1 feat: grouped the challs 2024-01-09 16:59:32 +07:00
..
images feat: grouped the challs 2024-01-09 16:59:32 +07:00
README.md feat: grouped the challs 2024-01-09 16:59:32 +07:00

README.md

Pizza Time

It's pizza time!! 🍕

About the Challenge

We were given a website without the source code, and there is only one functionality on this website (we can place an order) and our input is reflected in the output.

preview

preview2

How to Solve?

Im assuming this website is vulnerable to SSTI. At first I can't input any special characters such as $, [, ], etc. But when I tried to use newline character or \n, suddenly the website didn't filter my input again.

Normal Input: normal

Bypass: bypass

And to obtain the flag, we need to escalate the SSTI to remote code execution. This is the final payload I used to read the flag

{{lipsum.__globals__.os.popen('cat$IFS/flag.txt').read()}}

flag

INTIGRITI{d1d_50m3b0dy_54y_p1zz4_71m3}