webProhard
ASIS Web Mail
ASIS CTF
Task: access an admin-only FLAG bucket in a microservices webmail application. Solution: exploit CRLF injection in a Go binary's http+post:// URL handler that URL-decodes the path before raw TCP, smuggling HTTP requests with X-User-Id:999 admin header to the internal ObjectStore.
$ ls tags/ techniques/
flaskssrfpostgresqlheader_injectionnginxgunicorncrlf_injectionhttp_request_smugglinggo_binary_reversingmicroservicesxml_parsingurl_decoding
SSRF via custom URL scheme (http+post://)CRLF injection through URL-decoded pathHTTP Request Smuggling to inject admin headersGo binary reverse engineering for protocol analysisMicroservices architecture exploitation
๐
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Board of Secrets Revengeโ miptctf
- [web][Pro]board_of_secretsโ miptctf
- [web][Pro]Lab 307 โ CrewHub โ File Upload RCE via Polyglot JPG/PHPโ hackadvisor
- [web][Pro]Lab 109 โ TaskForge โ IDOR in Account Settings APIโ hackadvisor
- [web][Pro]Print on Demand (ะะตัะฐัั ะฟะพ ะทะฐะฟัะพัั)โ duckerz