Skip to content

Latest commit

 

History

History
49 lines (25 loc) · 1.22 KB

File metadata and controls

49 lines (25 loc) · 1.22 KB

SOAP

Overview

100 points

Category: Web Exploitation

Tags : #picoCTF 2023 Web Exploitation XXE

Description

The web project was rushed and no security assessment was done. Can you read the /etc/passwd file?

Additional details will be available after launching your challenge instance.

Solution

After start of the instance picoCTF will provide you a link to running instance.

There is a site.

Screenshot of the main screen

We saw tag XXE -> XML external entity and also, when we inspect static resources (F12 -> Sources in Google Chrome) of the site, we saw this two files:

detailsCheck.js

Screenshot of the js

xmlDetailsCheckPayload.js

Screenshot of the js

So, now we know for sure, that it is XXE.

Also in the index.html we saw the endpoint for the POST request:

Screenshot of the index.html

We need just to make POST request to the <url_of_site>/data with XML payload to get the flag.

Let's check the format for XML request. Just click button on the site and look the request format in Network tab:

Screenshot of the debug tab

Now just send POST request with our payload and obtain the flag:

Screenshot of the flag