jellyCTF

Bro_visited_his_site_2 [460 pts]

Writeup author: lolmenow

Difficulty: easy

Provided files: N/A (same as first version)

Url: https://bro-visited-his-site.jellyc.tf/

Description: ok, but can you get /app/flag.txt

This is exactly the same vulnerability as the first edition of this challenge, please read that before continuing here.

Using the same payload as the last challenge, we can just modify it to read /app/flag.txt

Once done, we are presented with:

jellyCTF{rc3p1lled_t3mpl4te_1nj3ct10nmaxx3r}pilled jellyCTF{rc3p1lled_t3mpl4te_1nj3ct10nmaxx3r}maxxer

And there is our flag!

Final flag: jellyCTF{rc3p1lled_t3mpl4te_1nj3ct10nmaxx3r}