MDL Considered Harmful

ImageMagick CVE-2016-3717

Problem

There's a bot named MDLChef in the Discord. You need to DM it, it doesn't respond in the server. On its host machine, there's a file at /opt/flag.txt - it contains the flag. Go get it.

Note: This is NOT an OSINT challenge. The source code really isn't available. Good luck.

Author: nb

Solution

If we use the /credits command, we can understand more of the stack.

We can see that ImageMagick is used.

I searched for ImageMagick exploits, and found https://imagetragick.com/.

It appears that if we use caption:@/path/to/file, we can read arbitrary files.

The rendered image contains the flag:

Last updated

Was this helpful?