227 words
1 minutes
TFC-CTF 2022
2022-07-31

CALENDAR - WEB (Medium)#

Description#

Are online calendars trusty? Note: The website displays “Error establishing a database connection” at startup. Please wait ~10 seconds and refresh The flag is format

Solution#

On visiting the challenge url,it was the simple website which was using wordpress. So, i started searching about wordpress CVE’s based on calenders.We ended up with this CVE

Screenshot

Here, what is the vulnerability is , It did not properly restrict access to the export files, allowing unauthenticated users to exports all events data in CSV or XML format.

Screenshot

Using this exported CSV file, we can able to find username and password. And the password is the FLAG!!!

PONG - WEB (WARMUP)#

Description#

Some random website that can ping hosts.

Solution#

It was the easy command injection challenge.

payload#

/index.php?host=127.0.0.1|cat%20../../../flag.txt

Diamonds - WEB (MEDIUM)#

Description#

Write something nice that passes our filter.

The webpage shows only one input box which can allow to enter only alphabets and numbers.

Screenshot

If we enter anything other than this it shows like That is far away from nice !! So,here we have to bypass the regex which were written on the server side.

There were a lot of payloads online on SSTI . But before that can be passed through to read the flag.txt file. After a time of research,Knowing that the regex can be bypassed with newlines, we can start looking for an exploit to read flag.txt

Solution#

<%= File.open('flag.txt').read %>

But we need to url encode this payload

Screenshot

TFC-CTF 2022
https://0xram.com/posts/tfcctf2022/
Author
0xRaminfosec
Published at
2022-07-31