Figgis
Overview
- Overall difficulty for me: Easy
In this challenge, we can spawn a docker instance:
Find the flag
Home page:
Seems like nothing here, let’s enumerate hidden directory via gobuster
:
┌──(root🌸siunam)-[~/ctf/GuidePoint-Security-Oct27-2022/Web/Figgis]
└─# gobuster dir -u http://10.10.100.200:54221/ -w /usr/share/wordlists/dirb/common.txt -t 100 -x php
[...]
/config (Status: 200) [Size: 516]
/cookie (Status: 200) [Size: 333]
/evaluate (Status: 200) [Size: 322]
/lookup (Status: 200) [Size: 315]
/xml (Status: 200) [Size: 311]
Let’s check all of them!
/config
:
Bad padding?
cookie
:
Seems useless?
/evaluate
:
Hmm… We can input something to execute codes.
I tried to execute code, but no dice.
/lookup
:
Hmm… What if it’s vulnerable to command injection?
According to HackTricks, we can try some payloads:
Oh! It works! Let’s find out the flag!
We got the flag!
Conclusion
What we’ve learned:
- Exploiting Command Injection