WM04 - 250pts
Briefing
Visit the Italian dish suggestion site at https://cfta-wm04.allyourbases.co and find a way to get the flag.
Solution
Try SSTI (Server Side Template Injection) with
{{'7'*7}}
, which outputs7777777
so the script is vulnerable. Note that editing and sending these requests is much easier using Burp Suite's repeater (intercept a request and right click then choose "Sent to repeater").Crash the script with
{{foo()}}
to get a stacktrace:There is a
template
variable passed to therender
function for the template. Let's send a request for{{template}}
to print the contents of thetemplate
/flag
variable. This shows the flag.
Flag
t3mpl4te_vu1n
Last updated