Miniweb

Web Exploitation (SSTI + SSRF challenge)

given a link with the source code

nothing interesting in the actual web. Then I proceed to investigate the source code

there are two folders with these files inside. These are the important files

front-server/app.py:

front-server/waf.py:

internal-server/src/index.php:

looking at these source code, I see there's a SSTI vulnerability in app.py at this part

which then will be sanitized by waf.py.

so to confirm this I put

to the endpoint

and it worked. So I crafted a payload that bypasses all the waf

and it worked!

then I just need to modify the payload to read flag.txt file from internal-server

so the final payload:

and got the flag

Flag: hacktoday{karena_roti_lebih_enak_dari_kunci_gang}

Last updated