How I Found 7 Logical Bugs in the com-olho CTF Feature
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。首先,我得仔细阅读文章,理解主要信息。 文章主要讲的是一个叫StrangeRwhite的人在安全平台com-olho上发现了七个漏洞,并且这些漏洞都被成功修复了。每个漏洞都有详细的描述和利用方法,比如无限积分获取、竞态条件导致的额外积分、以及允许编辑已发布的CTF等。 接下来,我需要把这些信息浓缩到100字以内。要抓住关键点:七个漏洞、修复情况、涉及的CTF平台、具体漏洞类型。同时,语言要简洁明了,避免复杂的术语。 可能的结构是:先点明发现者和平台,然后说明漏洞的数量和类型,最后提到修复情况。这样既全面又简洁。 最后检查一下字数,确保不超过限制,并且表达清晰。 </think> 作者在安全平台com-olho上发现了七个漏洞,并详细描述了每个漏洞的利用方法和修复情况。这些漏洞包括无限积分获取、竞态条件导致的额外积分、以及允许编辑已发布的CTF等高危问题。所有漏洞均被成功修复。 2025-12-30 08:52:35 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

StrangeRwhite

Welcome back! You might remember that in the last blog I talked about 7 bugs in a small part of a website — this blog is about that.

And sorry, I don’t have any proof images this time (as always), because the platform com-olho blocked me. Yeah — they just blocked me. All my triage report, upcoming payment was just gone. They don’t respond to emails at all. So be careful if you’re hunting on comolho. Yes, I’m taking the name — because honestly, what worse can they do now?

Let me clear a one things. All the 7 bugs covered in these blogs were on their own platform, comolho, and all of them were successfully fixed.

Let’s talk about the website in sort. The platform has a CTF program where you can submit flags and earn some points according to level of CTF. You can also create your own CTF and earn points if it’s good enough, they will upload it to their program.

1. Unlimited Points Farming via Replayed Flag Submission — P2

So when we submit a correct flag, we get points and the submit flag option is removed. The bug is that only the input is removed — there is no server-side validation.

  1. While submitting a correct flag, I capture the request:
    POST /api/ctf/submit_answer/128 using Burp.
  2. Send this request to Repeater. Now I can submit the same flag infinite times, and each time it will give me points.

2. Race Condition Allows User To Collect Extra Points From Single — P4

I know you might be thinking why this is separated from point 1 — it’s because I found this later.

  1. Follow the same process until the request is in Repeater, then right-click and choose extension, and select Turbo Intruder.
  2. Choose any script and launch the attack — the points get added multiple times.

3. https://strangerwhite.medium.com/how-i-stumbled-on-a-bug-that-gave-5x-the-rewards-without-any-hacking-tools-002767451f85

Please read this blog first for better understanding of how creating and submitting your own CTF works because all the below bugs are related this.

4. Unlimited Points Earned By Re-submitting CTF Using Draft Manipulation — P2

When you submit your own CTF for review, you normally cannot revert it back to draft — you can only edit the CTF.

  1. Open Burp Suite and intercept the request while submitting a CTF:
    POST /ctf/123/
  2. Send this request to Repeater and then let the intercepted request go forward (note: this is not the same as the first bug). The CTF is submitted successfully, and I get points for submitting it.
  3. Now i come back to the Repeater tab and modify the request by adding:
    save_as_draft = true
  4. Send the request. The CTF reverts back to draft. I repeated this process again and again, and each time I received points.

How did I know save_as_draft was a parameter? Because when I originally submitted the CTF as a draft, this parameter was present in the request.

Press enter or click to view image in full size

Real request

5. Race Condition Allows Submitting More Than 5 CTF per Months — P3

Because of the huge number of CTF submissions, they decided to limit it to only 5 CTFs per month.

  1. I created more than 5 CTFs and saved all of them as drafts.
  2. Open Burp Suite, click on Edit CTF, and in the request i get the CTF ID. Don’t change anything — just save it as a draft.
  3. Do the same for all other CTFs to collect their CTF IDs.
  4. Now submit a CTF and send this request to Repeater multiple times (5+).
  5. After that, change the CTF IDs in the requests (the ones obtained in step 2).
  6. Create a group in Repeater and send all the requests in parallel.

6. Points Awarded For Rejecting CTF via Manipulation request — (don’t remember)

So I submitted a CTF and it wasn’t good, so it got rejected. Basically, if a CTF is rejected, all actions should be blocked. But because of this bug, I was still able to submit a flag and get points.

  1. I submitted a flag to any CTF just to get the request format and sent it to Repeater.
  2. In that request, I changed the CTF ID to my rejected CTF ID (I explained above how to get the ID).
  3. I then changed the flag to the correct one — I knew the flag because I created that CTF.
  4. Done. I got points for the rejected CTF.

Note: If your CTF is approved, others can solve it and submit flags, but you cannot solve your own CTF. And if the CTF is rejected, you should not be able to do anything at all.

7. Allow editing of approved / publicly available CTFs. — P2

Once a CTF is approved, we are not allowed to edit it, but there is no server-side validation in place. This is the most dangerous bug in this blog, because once a CTF is approved, it becomes publicly available and other users can interact with it.

Get StrangeRwhite’s stories in your inbox

Join Medium for free to get updates from this writer.

I was able to edit an approved CTF. I could upload a virus, add phishing links, or redirect users anywhere. Users would think it’s just a normal CTF and run it to solve, without knowing what’s really inside. I submitted this as P1, but they changed it to P2.

  1. I opened Burp Suite and edited any old CTF, captured the request, and sent it to Repeater.
  2. Then I changed the CTF ID to an approved CTF ID.
  3. I could change anything I wanted, and all those changes became publicly available

Press enter or click to view image in full size

Done! This blog is a bit different from my other blogs, and it may not be as clear, because I don’t remember everything perfectly and I had to put all the bugs into one post. I also didn’t want to make it too long. So if you don’t understand anything, just mail me and I’ll share the original POC.

Got questions? Email me: [email protected] or reach out on Twitter: @StrangeRwhite9


文章来源: https://infosecwriteups.com/how-i-found-7-logical-bugs-in-the-com-olho-ctf-feature-7adc4c88615d?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh