The website is simple, with few elements. There is only a form at /main that takes an email address and reflects it on the page. A backend check ensures that the submitted value matches the format of an email address.
To retrieve the flag, we need to achieve RCE to execute the getflag binary.
Solution
To solve this challenge, we need to bypass the email format validation. Then, we exploit an SSTI to achieve RCE.
Server-Side Template Injection
To begin, if we examine the application code, we quickly notice that an SSTI is possible:
The value of the email variable is placed in email_template and then rendered. It is therefore possible to send, for example, {{ 7*7 }}@mail.com, and the rendered output will display [email protected]. However, since the email variable passes through the EmailModel() class, an error occurs when we start using quotes or parentheses.
Analysis and Bypass of the EmailModel Class
To avoid triggering the error and to use parentheses and quotes for executing an RCE payload via SSTI, we need to locate where the email format check is performed in the EmailModel class or rather in EmailStr.
If we follow the code, we reach the EmailStr class, then _validate(), and finally validate_email(). In this function, we find the following lines:
m = pretty_email_regex.fullmatch(value) # value = emailname: str |None=Noneif m:
unquoted_name, quoted_name, value = m.groups()
name = unquoted_name or quoted_name
email = value.strip()
try:
parts = email_validator.validate_email(email, check_deliverability=False)
except email_validator.EmailNotValidError as e:
raise PydanticCustomError(
'value_error', 'value is not a valid email address: {reason}', {'reason': str(e.args[0])}
) from e
We understand that to avoid triggering an error when using quotes or parentheses, we need to match the quoted_name group. The regex to match is located in pretty_email_regex: