Skip to main content

Challenge 5

Fifth challenge of the Flare CTF around the famous dark net marketplace, Silk Road.

Challenge description

  • CTF Name : Flare CTF 2025
  • Categories : CTI, Web
  • Difficulty : Unknown
  • Date : December 22-29, 2025

We are given the following challenge:

Challenge

It was time to spin up Tor and see what was behind that onion link.

Digging into the website

The homepage has many products listed. One thing immediately caught my eye was the "FlareCTF Flag LEAKED!" product, sold for 0.15 BTC.

Marketplace

Clicking "add to cart" did nothing. So I guessed I had to be logged in to add products to the cart.

There was no registration page. So I tried to login with the default combo "admin:admin".

That didn't work. But it gave some test credentials : buyer:silkroad

alt text

Using them, I was able to log in.

alt text

Clicking "add to cart" on the flag product still did nothing. So I decided to check the orders page where two orders were already listed.

alt text

I saw that the order for the item 🔥 PRIVATE LOG CHANNEL ACCESS 2026 😈 was already shipped. The only sellers notes were Check mail., so nothing interesting for now. But I saw another interesting detail : the order page was loaded using the query parameter id. So id=166 for this order. That could be a clear IDOR vulnerability (see OWASP Cheat sheet).

Exploiting the IDOR vulnerability

alt text Indeed, by changing the id parameter incrementally, I was able to access other users' orders. The one to find was id=3.

alt text

FLAG

flare{0rd3r_4l0ng_th3_51lk_r04d_99}

Thanks Flare for this nice CTF challenge and t-shirt !

alt text