HackTheBox Writeup - Challenges - Neonify
🕒 2025/04/28
- Category:
Web - Difficulty:
Easy - IP:
94.237.61.82:37667
1. Website
- If your input contains only numbers, letters, and spaces
123 abc
- If it includes anything else
Malicious Input Detected
2. Source Code
app/views/index.erb

app/controllers/neon.rb
- #14: it will check if the input contains only numbers, letters, and spaces
index.erb#16 &neon.rb#15: it evaluates user input as ERB, stores it in@neon, and renders it inside an<h1>tag.
3. Bypassing Regex Check
As demonstrated in the referenced article, we can bypass the regex check by \n into the input.
Let’s first send a test payload to verify that the injection works:
It works. We proceed with the actual payload to read the flag:





