WM05 - 250pts
Last updated
Was this helpful?
Last updated
Was this helpful?
Access the site at , then find and read the contents of the flag file, to get the flag.
Note that using Burp Suite's repeater functionality makes editing and sending the requests for this challenge much easier.
This is a challenge. 's page about Command Injection is very helpful here.
Sending an &&ls
command to list the current directory works and shows us that there is a file called lambda_function.py
that likely contains the logic of the AWS lambda function. However, trying to use cat
to display the file by running cat lambda_function.py
doesn't work and instead returns Error: Invalid Character Detected
.
Assuming the script filters spaces we can use the "Bypass without space" section from 's page about Command Injection and format our command like so &&{cat,lambda_function.py}
. This successfully leaks the server logic, which we saved to .
Pass &&{ls,-a}
as the path
argument in the JSON request to print all files, including hidden files in the current directory. There is a folder called ...
.
Use &&{ls,-a,...}
to list the contents of the ...
folder, which contains a file named .flag.txt
.
Run &&cat<.../.flag.txt
to get the flag.
bh%3kx9j75%3k2*7!n