jellyCTF
Bro_visited_his_site_2 [460 pts]
Writeup author: lolmenow
Difficulty: easy
Provided files: N/A (same as first version)
Url: https://bro-visited-his-site.jellyc.tf/
Description: ok, but can you get /app/flag.txt
This is exactly the same vulnerability as the first edition of this challenge, please read that before continuing here.
Using the same payload as the last challenge, we can just modify it to read /app/flag.txt
Once done, we are presented with:
jellyCTF{rc3p1lled_t3mpl4te_1nj3ct10nmaxx3r}pilled jellyCTF{rc3p1lled_t3mpl4te_1nj3ct10nmaxx3r}maxxer
And there is our flag!
Final flag: jellyCTF{rc3p1lled_t3mpl4te_1nj3ct10nmaxx3r}