ultra-crawl

This challenge was part of the ROCSC competition 3 years ago.

Description

Here is your favorite proxy for crawling minimal websites.


It took me a while to discover the first vulnerability, but in the end, it was actually quite simple. I was able to access the local filesystem using the default file:// wrapper.

At first, I thought I had solved the challenge, but the classic /home/ctf/flag.txt file didn’t work. So, I started accessing other files, but nothing useful came up. I couldn’t find any logs or source files for the web app, and it was really frustrating because nothing seemed to work. Then I remembered that this was running in a container, so there had to be a bash script to start the app. Sure enough, there was a start.sh file.

Now it was time to check the web application's source code.

All I needed to do was change the Host header to company.tld.

Last updated