webPromedium

DocuNest

hackadvisor

Task: Collaborative documentation platform with a docs viewer that uses PHP include() with unsanitized file parameter, enabling LFI. Flag is stored as an environment variable and in /root/flag.txt (chmod 600). Solution: Chain LFI with Apache access log poisoning — inject PHP webshell via User-Agent header, then include the poisoned log to achieve RCE and read the FLAG environment variable.

$ ls tags/ techniques/
environment_variable_exfiltrationpath_traversal_lfilfi_to_rce_via_log_poisoningapache_access_log_inclusionuser_agent_php_injection

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups