webhard

ASIS Web Mail

ASIS CTF

Task: access an admin-only FLAG bucket in a microservices webmail application. Solution: exploit CRLF injection in a Go binary's http+post:// URL handler that URL-decodes the path before raw TCP, smuggling HTTP requests with X-User-Id:999 admin header to the internal ObjectStore.

$ ls tags/ techniques/
SSRF via custom URL scheme (http+post://)CRLF injection through URL-decoded pathHTTP Request Smuggling to inject admin headersGo binary reverse engineering for protocol analysisMicroservices architecture exploitation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]