ctf-vs-the-real-world
ctf-vs-the-real-world copied to clipboard
Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise
ctf-vs-the-real-world
Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise
-
CVE-2016-5007
- https://www.intrinsec.com/cve-2016-5007-spring-security-mvc-path-matching-inconsistency/
-
CVE-2020-6512 (unconfirmed CTF background)
- https://twitter.com/dmxcsnsbh/status/1643105597276188672
-
CVE-2020-27348
- https://github.com/osirislab/CSAW-CTF-2019-Quals/tree/master/web/buyify
-
CVE-2020-27348
- https://twitter.com/itszn13/status/1369396838646833159
-
CVE-2012-1823
- http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
- Unintended
-
Bunyan's Revenge
- https://ctftime.org/task/373
- https://www.usenix.org/sites/default/files/conference/protected-files/enigma_slides_nighswander.pdf
- Intended Solution
-
Lollerska8ters FreeBSD 0day
- http://dubai2013.honeynet.org/briefings.html#talk8
- Brought for extra pwnage during AD CTF
-
Pirate Danbi
- https://twitter.com/beist/status/577214235073089536
- https://github.com/ctfs/write-ups-2015/tree/master/codegate-ctf-2015/reversing/pirate-danbi
-
Several from Google CTF 2019:
- Gomium Browser
- https://github.com/google/google-ctf/blob/master/2019/finals/solutions.pdf
- CVE-2019-18276
- https://nvd.nist.gov/vuln/detail/CVE-2019-18276
- https://github.com/google/google-ctf/blob/master/2019/finals/solutions.pdf
- gPhotos2
- https://blog.bushwhackers.ru/googlectf-2019-gphotos-writeup/
- (unintended, used different than expected image magick vulns!)
- intended, but also real-world imagemagick 0day: https://blog.kaibro.tw/2019/11/05/Google-CTF-2019-Final-%E9%81%8A%E8%A8%98/
-
35C3 CTF Entire category of 0day challenges (zajebiste).
- https://archive.aachen.ccc.de/35c3ctf.ccc.ac/challenges/index.html
- But there were many other unintended vulnerabilities found and used instead throughout the CTF! https://twitter.com/_niklasb/status/1111624505615675392?s=19
- https://twitter.com/_niklasb/status/1121804193839427584?s=19
- CVE-2019-2556
- https://twitter.com/j0nathanj/status/1085587860315693057?s=19
-
Many CTF challenges have inspired real-world bug finding:
- https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html?m=1
-
CVE-2019-2684
- https://i.blackhat.com/eu-19/Wednesday/eu-19-An-Far-Sides-Of-Java-Remote-Protocols.pdf
-
https://bugs.chromium.org/p/chromium/issues/detail?id=1077139
-
CVE-2011-2018
- https://j00ru.vexillium.org/papers/2012/cve_2011_2018.pdf
TODO
- [ ] Sortable/better table format
- [ ] Standard tags for different types of interactions (used as legit challenge, found accidentally, used against infra, etc)