webhard
Where's Your HEAD At?
kalmarctf
Task: a Flask service cloned an attacker-controlled Git repository, created `headlocation`, then executed `git show HEAD` from inside that path. Solution: hide a bare repository at `headlocation`, force a promisor fetch for a missing object, and use repo-local `sshCommand` to run `/flagout` and exfiltrate the flag.
$ ls tags/ techniques/
buried_bare_repo_confusionpromisor_fetch_triggersshcommand_rceout_of_band_exfiltration
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]