jellyCTF 2024 - bro_visited_his_site_2
- 1 min read
Overview
This was the second part of the same application, which also involved the Server-Side Template Injection Vulnerability. However, this time the flag was in the file flag.txt in the application directory, which can be accessed through remote code execution using the request object.
Approach
To achieve remote code execution, the goal was to import the os module, which can be found in request’s __builtins__ method via the __globals__ attribute.
Solution
I first used pwd to print the current working directory of the application. I then read the contents of flag.txt with its absolute path.

