Rating: 5.0

To exploit this, you need to use a ‘prototype pollution’ vulnerability within the flat library in order to gain RCE against the target. This requires a request to the server to 'pollute' the JavaScript objects, then a second request to trigger the payload. Overall, it was a really interesting box!

Original writeup (https://http418infosec.com/htb-cyber-apocalypse-ctf-2021-blitzprop-writeup).