team-logo
Published on

swampCTF 2025 - Editor - Web challenge

Authors

Introduction

I solved the Editor challenge in the Web category. More info about this CTF is here

Also check out my blog, I also posted writeup there - swampCTF 2025 - Editor - Web challange | ManFcG

Editor

Table of contents

Editor

I went to the page that was in the challange description, and I was prompted with the message "Forbidden"

forbidden

I set up the server locally by downloading the attachment, then going into the backend and typing python server.py

I went to the site I put up locally (and again forbidden)

forbidden

I checked the source code of this forbidden site

source code

and I added the following code snippet to <head>

<meta http-equiv="refresh" content="0;url=http://chals.swampctf.com:47821/flag.txt">

After this, flag popped up:

flag

swampCTF{c55_qu3r135_n07_j5}

Why it works?

  • I uploaded the meta tag into the HTML:
    • The <meta http-equiv="refresh" content="X;url=Y"> tells the browser to redirect the page.
    • The content="0" means redirect immediately (0 seconds delay).
    • The url=http://chals.swampctf.com:47821/flag.txt indicates the location of the redirection. In this case, it is also the place where the flag is stored.
  • When the site renders HTML:
    • The browser thinks it is loading a normal page.
    • The meta refresh forces the browser to go to the flag file.
  • Bypassing the Flask Server’s Restriction:
    • The Flask app checks the Referer header to block direct file access.
    • However, since the meta refresh comes from an allowed source (my local hosted site), the server treats it as a valid request.
    • The browser follows the redirect and displays the flag.