Smug-Dino
Description
Don't you know it's wrong to smuggle dinosaurs... and other things?
Author: rollingcoconut
Application: http://web.csaw.io:3009/
Analysis

The application has 3 routes: home, hint and flag.
If we request the flag we are redirected to localhost.
Hint:

If we enter nginx and 1.17.6 we are redirected to /succeed_hint:
Doing a quick google dorking query with known keywords: "cve" "2019" "nginx" "1.17.6" I found CVE-2019-20372: nginx Error Page request smuggling

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
PoC demonstration: https://youtu.be/jimGQpftYWs by vulnmachines.
Solution
Here you can see I'm making request with BurpSuite, most headers are not important and hence have been removed for exploit. It's important that first request connection is "keep-alive" so we can smuggle second (or more) requests.

Flag: csawctf{d0nt_smuggl3_Fla6s_!}
Last updated