Contents

๐ŸŒ Editor

A detailed write-up of the Web challenge 'Editor' from SwampCTF - 2025

/images/SwampCTF-2025/Editor/challenge_presentation.png
Challenge Presentation

๐Ÿ“Š Challenge Overview

Category Details Additional Info
๐Ÿ† Event SwampCTF-2025 Event Link
๐Ÿ”ฐ Category Web ๐ŸŒ
๐Ÿ’Ž Points 150 Out of 500 total
โญ Difficulty ๐ŸŸข Easy Personal Rating: 0/10
๐Ÿ‘ค Author Unknown Profile
๐ŸŽฎ Solves (At the time of flag submission) 152 solve rate
๐Ÿ“… Date 31-03-2025 SwampCTF-2025
๐Ÿฆพ Solved By mH4ck3r0n3 Team: havce

๐Ÿ“ Challenge Information

I took a few hours to create a simple HTML/CSS previewer system. Since there’s no way to add JavaScript then my server should be safe, right? Grab the flag from the http://chals.swampctf.com:47821/flag.txt file on the server to show that this isn’t the case. The flag is in the standard format. Good luck! http://chals.swampctf.com:47821

๐ŸŽฏ Challenge Files & Infrastructure

Provided Files

Files:

๐Ÿ” Initial Analysis

First Steps

Initially, the website appears as follows:

/images/SwampCTF-2025/Editor/site_presentation.png
Site Presentation

Since I didn’t find anything interesting here, I moved on to analyzing the attached files. This is a Flask challenge where we need to access the /flag.txt route. Direct access results in a Forbidden response:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
@app.route("/", defaults={"path": "index.html"})
@app.route("/<path:path>")
def serve_files(path):
ย  ย  try:
ย  ย  ย  ย  return send_from_directory(app.static_folder, path)
ย  ย  except:
ย  ย  ย  ย  referer = request.headers.get("Referer", "")
ย  ย  ย  ย  if not referer or not (referer.startswith("http://127.0.0.1:5000/") or referer.startswith("http://localhost:5000/")):
ย  ย  ย  ย  ย  ย  print(referer)
ย  ย  ย  ย  ย  ย  abort(403, description="Forbidden: Accessing files directly is not allowed... You didn't think it'd be that easy did you.")  

ย  ย  ย  ย  return send_from_directory("/app/", path) 

As we can see, if the Referer header is not set to http://127.0.0.1:5000/ or http://localhost:5000/, we receive a 403 status code. Initially, I thought it would be enough to make a request like this:

1
curl http://chals.swampctf.com:47821/flag.txt -H "Referer: http://localhost:5000/"

to access the /flag.txt route, but this returned Forbidden:

/images/SwampCTF-2025/Editor/forbidden.png
Forbidden

Let’s move on to the exploitation phase.

๐Ÿ”ฌ Vulnerability Analysis

Potential Vulnerabilities

  • 403 Bypass (?)

๐ŸŽฏ Solution Path

Exploitation Steps

Initial setup

To better understand the challenge and how it works, the first thing I did was test it locally. When I tried sending the same request as before:

1
curl http://localhost:5000/flag.txt -H "Referer: http://localhost:5000/"

I was able to retrieve the flag:

/images/SwampCTF-2025/Editor/local_flag.png
Local Flag

How is this possible? At first, I thought the challenge was brokenโ€ฆ let’s move on to the next phase to analyze everything more thoroughly.

Exploitation

The first thing I did was import sys to use sys.stdout.flush() and add print() debug statements to understand how the challenge works. However, focusing on the fact that it worked with Host: localhost:5000 and Referer: http://localhost:5000/, I tried the same approach for the remote challenge by sending a request with identical Host and Referer headers:

1
curl http://chals.swampctf.com:47821/flag.txt -H "Referer: http://chals.swampctf.com:47821/"

Using this method, just like with localhost, I obtained the flag. I then thought that the implementation on the server might be different (?).

Flag capture

/images/SwampCTF-2025/Editor/manual_flag.png
Manual Flag

๐Ÿ› ๏ธ Exploitation Process

Approach

The automatic exploit performs a simple GET request by setting the Referer: http://chals.swampctf.com:47821/ header and prints the response.

๐Ÿšฉ Flag Capture

Flag

swampCTF{c55_qu3r135_n07_j5}

Proof of Execution

/images/SwampCTF-2025/Editor/automated_flag.png
Automated Flag
Screenshot of successful exploitation

๐Ÿ”ง Tools Used

Tool Purpose
Python Exploit

๐Ÿ’ก Key Learnings

Skills Improved

  • Binary Exploitation
  • Reverse Engineering
  • Web Exploitation
  • Cryptography
  • Forensics
  • OSINT
  • Miscellaneous

๐Ÿ“Š Final Statistics

Metric Value Notes
Time to Solve 00:10 From start to flag
Global Ranking (At the time of flag submission) 17/751 Challenge ranking
Points Earned 150 Team contribution

Created: 31-03-2025 โ€ข Last Modified: 31-03-2025 Author: mH4ck3r0n3 โ€ข Team: havce