webhard
Ghost Board
0xl4ugh
Task: Retrieve a flag from a randomly-named file on a Spring Boot server with AngularJS frontend and Puppeteer bot. Solution: Chain AngularJS CSTI via HTML entity bypass to steal admin JWT, exploit Thymeleaf __${...}__ preprocessing SSTI for SpEL injection, use Spring DefaultResourceLoader for file read, and leak the flag from /proc/1/environ.
$ ls tags/ techniques/
angularjs_cstihtml_entity_bypassthymeleaf_preprocessing_sstispel_injectionspring_resourceloader_file_readproc_environ_leak
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]