Trial by Fire

Personal Rating: Easy

We start off with a website and we have the source code for it. Routes.py shows this:

Routes.py

Flask is used as template engine and user input is used in a template. An SSTI is very likely.

Inserting {{7*7}} yields 49 as warrior name, which confirms the SSTI vulnerability.

Inserting {{config.items()}} yields:

I tested some more payloads. Some of them returned a lot of information about the internal environment. This one worked to read files and read the flag:

HTB{Fl4m3_P34ks_Tr14l_Burn5_Br1ght_a206c8b374d5751352fa25389e55a03f}

Last updated