Siunam's Website

My personal website

Home About Blog Writeups Projects E-Portfolio

Figgis

Overview

In this challenge, we can spawn a docker instance:

Find the flag

Home page:

Seems like nothing here, let’s enumerate hidden directory via gobuster:

┌──(root🌸siunam)-[~/ctf/GuidePoint-Security-Oct27-2022/Web/Figgis]
└─# gobuster dir -u http://10.10.100.200:54221/ -w /usr/share/wordlists/dirb/common.txt -t 100 -x php
[...]
/config               (Status: 200) [Size: 516]
/cookie               (Status: 200) [Size: 333]
/evaluate             (Status: 200) [Size: 322]
/lookup               (Status: 200) [Size: 315]
/xml                  (Status: 200) [Size: 311]

Let’s check all of them!

/config:

Bad padding?

cookie:

Seems useless?

/evaluate:

Hmm… We can input something to execute codes.

I tried to execute code, but no dice.

/lookup:

Hmm… What if it’s vulnerable to command injection?

According to HackTricks, we can try some payloads:

Oh! It works! Let’s find out the flag!

We got the flag!

Conclusion

What we’ve learned:

  1. Exploiting Command Injection