Solved by O0034 - Mystiz's Fan Club
Author: ken
Category: pwn
Difficulty: ★★★★★
Description:
CTF player must know how to UXSS again. (其實唔難)
Web: http://return-of-babyuxss-return-4iz5ng.hkcert23.pwnable.hk:4444/
(500 points, Tertiary: 0 solve, Open: 1 solve, International: 1 solve)
No attachment was provided.
CVE-2023-3079
https://github.com/mistymntncop/CVE-2023-3079
https://hackmd.io/@hollowctf/hkcert2022-babyUXSS-return
The procedure is 99.9% the same as babyUXSS return in HKCERT CTF 2022, except for a newer Chrome version (90 -> 114) so we need another exploit. This time we have found our serendipity, kudos to my teammate @botton for finding a HTML POC (https://github.com/vu-ls/Zenbleed-Chrome-PoC/tree/main) after I suggested him the possible CVE number. Unfortunately I went to sleep and missed the first blood.
Change the shellcode in line 248 to a reverse TCP shell shellcode generated by msfvenom and you are good to serve.