MD2PDF

The title and description tell us everything we need to know. This is a conversion tool that takes Markdown (MD) files and converts them to PDF. Somewhere in there is a flag.


First thing I do is run an nmap scan to check for open ports:

nmap -sV 10.80.130.2

Open ports: 22, 80, and 5000. Port 80 is HTTP so let’s check the website.

Not much to work with.

Poking at the Input

It has to be something with the input. I try a few markdown commands like ls and pwd in different ways, nothing. Then I start wondering if the converter will process raw HTML tags.

The converter is rendering HTML, which opens the door for SSRF (Server Side Request Forgery). The idea is that we can trick the server into making requests on our behalf including to places we normally can’t reach.

Finding the Hidden Path

I run gobuster to check for any interesting paths:

gobuster dir -u http://10.80.130.2 -w /usr/share/wordlists/dirb/common.txt

It finds one path: /admin

Let’s try to access it directly.

Forbidden. It can only be accessed internally on port 5000. But if the converter makes requests on the server’s behalf, maybe we can use it to reach that internal page:

<iframe src="http://localhost:5000/admin"></iframe>

It works. The flag appears.

Flag: flag{1f4a2b6ffeaf4707c43885d704eaee4b}