# NeverLan CTF 2018: What the LFI?

**Category:** Web Exploitation
**Points:** 200


>There is a file located at /var/www/blah.php Get that file to execute to retrieve the flag.


## Write-up

Ok, so we looking for some LFI.

We have some links `?feed=rss2 / ?p=1 / ?m=201802` but there is no LFI..

As we see this can be site on wordpress engine:
>\<meta name="generator" content="WordPress 4.9.4" /\>

So we can try wp-scan...and there is our LFI! We have outdated plugin here.

[!] Title: SAM Pro (Free Edition) <= - Local File Inclusion (LFI)
Reference: https://wpvulndb.com/vulnerabilities/8647
Reference: https://www.pluginvulnerabilities.com/2016/10/28/local-file-inclusion-lfi-vulnerability-in-sam-pro-free-edition/
Reference: https://plugins.trac.wordpress.org/changeset/1526624/sam-pro-free

Let's do this.

**Step 1:**

`echo -n 'test.php' | base64`


>No such file or directory in /var/www/html/wp-content/plugins/sam-pro-free/sam-pro-ajax-admin.php

**Step 2:**

Let's craft good directory.

`echo -n '../../../../blah.php' | base64`


That's all, the flag is `flag{dont_include_files_derived_from_user_input_kthx_bai}`.

Original writeup (https://github.com/Pwn-Collective/CTF-writeups/tree/master/NeverLan-CTF-2018-writeup/Interweb/What-the-LFI).