Post

HackTheBox Challenge Spookifier (Web)

Writeup for HackTheBox Challenge Spookifier

HackTheBox Challenge Spookifier (Web)

Challenge Synopsis

There’s a new trend of an application that generates a spooky name for you. Users of that application later discovered that their real names were also magically changed, causing havoc in their life. Could you help bring down this application? (Source)

Enumeration

Playing around with the website, we can observe that the website takes in an input and “spookifies” it to some special font.

webpage

However, we can notice that the URL has an interesting parameter ?text=shiro.

What happens if we give a simple SSTI payload?

ssti

Exploitation

Now that we know the webapp is vulnerable to SSTI, we can just simply read the flag.txt using the following payload ${open('/flag.txt').read()}.

Note: ${system('cat flag.txt')} payload returned a 500 server error.

flag

Flag: HTB{t3mpl4t3_1nj3ct10n_C4n_3x1st5_4nywh343!!}

This post is licensed under CC BY 4.0 by the author.