ultra-crawl
This challenge was part of the ROCSC competition 3 years ago.
Last updated
This challenge was part of the ROCSC competition 3 years ago.
Last updated
Here is your favorite proxy for crawling minimal websites.
It took me a while to discover the first vulnerability, but in the end, it was actually quite simple. I was able to access the local filesystem using the default file://
wrapper.
At first, I thought I had solved the challenge, but the classic /home/ctf/flag.txt
file didn’t work. So, I started accessing other files, but nothing useful came up. I couldn’t find any logs or source files for the web app, and it was really frustrating because nothing seemed to work. Then I remembered that this was running in a container, so there had to be a bash script to start the app. Sure enough, there was a start.sh
file.
Now it was time to check the web application's source code.
All I needed to do was change the Host header to company.tld.