webhard
ASIS Web Mail
ASIS CTF
Task: access an admin-only FLAG bucket in a microservices webmail application. Solution: exploit CRLF injection in a Go binary's http+post:// URL handler that URL-decodes the path before raw TCP, smuggling HTTP requests with X-User-Id:999 admin header to the internal ObjectStore.
$ ls tags/ techniques/
flaskssrfpostgresqlheader_injectionnginxgunicorncrlf_injectionhttp_request_smugglinggo_binary_reversingmicroservicesxml_parsingurl_decoding
SSRF via custom URL scheme (http+post://)CRLF injection through URL-decoded pathHTTP Request Smuggling to inject admin headersGo binary reverse engineering for protocol analysisMicroservices architecture exploitation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]