How is this vulnerable?

[HttpGet] public async Task<IActionResult> Get([FromQuery(Name = "destination")] string destination, [FromQuery(Name = "level")] int level) { var psi = new ProcessStartInfo { RedirectStandardOutput = true, psi.FileName = "ping", psi.Arguments = destination }; var ct = new CancellationTokenSource(TimeSpan.FromSeconds(20)).Token; var process = Process.Start(psi); await process.WaitForExitAsync(ct); return Ok(process.StandardOutput.ReadToEnd()); }

This is the source code. You should be able to read flag2.txt. It is a simple ping function on user GUI, where you get back the result of the ping command. If the host is wrong, the application reflects back the bad hostname. I though there is a way to ping the value inside the flag2.txt file to reflect it back but no luck with that.

It is emphasized multiple times it uses tcpping and all flags can be used, but I found no way the read to content of the file.

The CTF is already over, it was an inhouse company CTF, I’m not trying to cheat in it or something, I just want to understand because the solutions havent been released. The source code came from a hint in the CTF. Also it is mentioned that no sanitization is used

submitted by /u/Astral_04
[link] [comments]

October 23, 2023
Read More >>

SolarWinds fixed three critical RCE flaws in its Access Rights Manager product

Researchers discovered three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product. Security researchers discovered three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product. SolarWinds Access Rights Manager (ARM) is a software solution developed by IT management and monitoring software provider SolarWinds, it was designed to help organizations […]

The post SolarWinds fixed three critical RCE flaws in its Access Rights Manager product appeared first on Security Affairs.

October 23, 2023
Read More >>