Skip to content

Glamtariels Fountain

Glamtariels Fountain                              Web Ring                              A picture containing clipart

Description automatically generatedAkbowl

A picture containing text

Description automatically generated

Text

Description automatically generated

Hint :
Early parts of this challenge can be solved by focusing on Glamtariel's WORDS.

This challenge is hosted on https://glamtarielsfountain.com/ . There is Princess Glamtrariel and a fountain and on the right side 4 items. It looks like when we drop them one by one on both Glamtariel and the mountain, they share something with us. Per the hint, we focus on the UPPERCASE words in their dialogues.

Items

UPPERCASE Words in the dialogues

1st set

A picture containing text, clipart

Description automatically generated

2nd Set

3rd Set

A picture containing accessory

Description automatically generated

         Simple Format

         Type

         Tamper

         Traffic Flies

         Path

         App

         Ringlist

 

As the dialogues mention we need to look at how the TRAFFIC FLIES, we intercept the traffic each time an item is dropped on the princess or the fountain. Turns out JSON is being sent and dialogs separated by ^ are sent as response.

Diagram

Description automatically generated with medium confidence

XML is another format in which you can TAMPER the request. Especially, if the application is vulnerable to XXE (XML External Entity) attack. So converted the JSON request payload to XML using the Burp Suite extension named Content Type Converter.

Since the hint mentioned TAMPER, tried tampering with requests using Burp Suite. But nothing useful would come up

Request JSON

Response JSON

A picture containing text

Description automatically generated

A picture containing chart

Description automatically generated

After changing to XML content type and also changing the reqType to xml in the payload, we get : "Zoom, Zoom, very hasty, can't do that yet!^Zoom, Zoom, very hasty, can't do that yet!"

Request

Response

Graphical user interface, text, application

Description automatically generated

A picture containing graphical user interface

Description automatically generated

Above meant the input XML request is correct, but we need to continue dropping items which we continue to do.
At last, dropping the 1st item of the 3rd set of items, we get a different message in the response.

Request

Response

Graphical user interface, application, Word

Description automatically generated

Text

Description automatically generated

Now we build our XXE payload looking for a local file file:///app/static/images/ringlist.txt
- The path is /app/static/images because thats where all the images are.
- The file name is ringlist.txt because princess notes previously I keep a list of all my rings in my RINGLIST file.
- The file extension is .txt because princess notes previously I like to keep track of my rings using a SIMPLE FORMAT.

Request

Response

Graphical user interface, text, application

Description automatically generated

Text

Description automatically generated

 

Map

Description automatically generated

In the response above, there is a path to a file static/images/pholder-morethantopsupersecret63842.png. So when we visit that file using the full URL, It shows picture of a folder named x_phial_pholder_2022 with two files named bluering.txt and redring.txt

 

Injecting with bluering.txt and redring.txt does not show anything interesting. file:///app/static/images/x_phial_pholder_2022/redring.txt

file:///app/static/images/x_phial_pholder_2022/bluering.txt

Graphical user interface, text, application, chat or text message

Description automatically generated

We note princess said at one point of time she didnt have a silver ring. So next we would inject with silvering.txt and that brings static/images/x_phial_pholder_2022/redring-supersupersecret928164.png in the response.

Request

Response

Graphical user interface, application, Word

Description automatically generated

Text

Description automatically generated

A picture containing text

Description automatically generated

Visiting redring-supersupersecret928164.png from the below URL shows this image:
https://glamtarielsfountain.com/static/images

/x_phial_pholder_2022/redring-supersupersecret928164.png

There is text named which appears to name another text file goldring_to_be_deleted.txt

 

So, next we feed goldring_to_be_deleted.txt to the XXE
file:///app/static/images/x_phial_pholder_2022/goldring_to_be_deleted.txt

Request

Response

Text

Description automatically generated

Text, letter

Description automatically generated

 

 

The bold REQest and secret TYPE potentially suggests that we should pass &xxe in the requestType and static image in the imgDrop and It shows another file path in the response :
static/images/x_phial_pholder_2022/goldring-morethansupertopsecret76394734.png,

Request

Response

Graphical user interface, text, application

Description automatically generated

Text, letter

Description automatically generated

We see the golden ring when wivit the full URL
https://glamtarielsfountain.com/static/images/x_phial_pholder_2022/goldring-morethansupertopsecret76394734.png

Answer : goldring-morethansupertopsecret76394734.png

 

We enter goldring-morethansupertopsecret76394734.png as the answer and that is accepted, and we get 100 coins as well.

A picture containing graphical user interface

Description automatically generated

As this point we have recovered the web ring