diff --git a/app.py b/app.py index 5e9bb47..ca3bec5 100644 --- a/app.py +++ b/app.py @@ -57,6 +57,14 @@ def found(): session['task1_id'] = id = hex(getrandbits(45))[2:] session['task1_flag'] = flag_task1 = f'C4TchFl4g{{{hex(getrandbits(45))[2:]}}}' task1_flag(flag_task1, id) + if request.method == 'POST': + user_flag = request.form['user_flag'] + if user_flag == flag_task1: + return render_template('found.html', flag=flag_task1, success_flag='.') + return render_template('found.html', flag=flag_task1, error='Ошибка: неверный флаг!') + if flag_task1: + return render_template('found.html', flag=flag_task1) + abort(404) return render_template('found.html') @app.route("/found-me/task1") diff --git a/static/imgs/main_icon.png b/static/imgs/main_icon.png index 72ddc49..0ec0331 100644 Binary files a/static/imgs/main_icon.png and b/static/imgs/main_icon.png differ diff --git a/templates/found.html b/templates/found.html index 3f7c8d2..747e214 100644 --- a/templates/found.html +++ b/templates/found.html @@ -11,5 +11,10 @@ +
SQL-инъекция - уязвимость системы, позволяющая пользователю ввести вредоносный код в SQL-запрос.
+
+ скрыть
+