Author: iLoop
Flag: EPT{This_was_one_way_to_solve_this}
To assist @nordbo with his graphical workload, we've developed an amazing image converter that allows the upload of images to be converted.
However, I think we made a mistake by uploading a image file with a secret message in it. Can you locate it?
This beginner-level challenge show us the IDOR (Insecure Direct Object References) vulnerability and was pretty straightforward, requiring us to identify an image containing a secret message. We were provided a link to a webpage with an image upload feature, hinting at a potential mistake in an uploaded file that held a secret message.
- Exploring the Upload Interface:
- Upon accessing the provided link, we found a simple interface that allowed users to upload an image file for conversion. We followed the instructions and uploaded an image, then pressed "Convert."
- Redirected Download Page:
- After initiating the conversion, we were redirected to a download page. While hovering over the download button, we observed a URL at the bottom left corner pointing to
/static/images/
, revealing where the converted images were stored.
- After initiating the conversion, we were redirected to a download page. While hovering over the download button, we observed a URL at the bottom left corner pointing to
- Inspecting the Image Directory:
- Navigating to
/static/images/
, we located a file namedflag.JPEG
, which seemed out of place.
- Navigating to
- Retrieving the Flag:
- Opening
flag.JPEG
, we discovered the hidden flag embedded in the image, successfully solving the challenge.
- Opening